Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2020-29660
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.725Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "name": "[oss-security] 20201210 2 kernel issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "name": "DSA-4843", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-12T18:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "name": "[oss-security] 20201210 2 kernel issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "name": "DSA-4843", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29660", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "name": "[oss-security] 20201210 2 kernel issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "name": "https://security.netapp.com/advisory/ntap-20210122-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "name": "DSA-4843", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "name": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29660", "datePublished": "2020-12-09T16:57:56", "dateReserved": "2020-12-09T00:00:00", "dateUpdated": "2024-08-04T16:55:10.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-29660\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2020-12-09T17:15:31.743\",\"lastModified\":\"2024-11-21T05:24:22.803\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 un problema de inconsistencia de bloqueo en el subsistema tty del kernel de Linux versiones hasta 5.9.13. Los archivos drivers/tty/tty_io.c y drivers/tty/tty_jobctrl.c pueden permitir un ataque de lectura de la memoria previamente liberada contra TIOCGSID, tambi\u00e9n se conoce como CID-c8bcd9c5be24\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"},{\"lang\":\"en\",\"value\":\"CWE-667\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.9.13\",\"matchCriteriaId\":\"64B92439-A36E-4A51-B34C-52E926DB908E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"3A756737-1CC4-42C2-A4DF-E1C893B4E2D5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"046FB51E-B768-44D3-AEB5-D857145CA840\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9B8171-F6CA-427D-81E0-6536D3BBFA8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"090AA6F4-4404-4E26-82AB-C3A22636F276\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDDF61B7-EC5C-467C-B710-B89F502CD04F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD92BFA-9117-4E6E-A13F-ED064B4B7284\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B7DA42F-5D64-4967-A2D4-6210FE507841\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E73901F-666D-4D8B-BDFD-93DD2F70C74B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0FD5AED-42CF-4918-B32C-D675738EF15C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34B25BEF-8708-4E2C-8BA6-EBCD5267EB04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE0F11D2-B5D9-46B4-BFC5-C86BC87D516A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04E3BD77-8915-4FFC-8483-5DB5D610F829\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E94ECB-BB51-4364-BEDD-8648C193196F\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/12/10/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210122-0001/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4843\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2020/12/10/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20210122-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2021/dsa-4843\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2020-29660
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2020-29660", "description": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "id": "GSD-2020-29660", "references": [ "https://www.suse.com/security/cve/CVE-2020-29660.html", "https://www.debian.org/security/2021/dsa-4843", "https://access.redhat.com/errata/RHSA-2021:4356", "https://access.redhat.com/errata/RHSA-2021:4140", "https://ubuntu.com/security/CVE-2020-29660", "https://advisories.mageia.org/CVE-2020-29660.html", "https://security.archlinux.org/CVE-2020-29660", "https://alas.aws.amazon.com/cve/html/CVE-2020-29660.html", "https://linux.oracle.com/cve/CVE-2020-29660.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2020-29660" ], "details": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "id": "GSD-2020-29660", "modified": "2023-12-13T01:22:11.566128Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29660", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9", "refsource": "MISC", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "name": "[oss-security] 20201210 2 kernel issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-b732958765", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "FEDORA-2020-bc0cc81a7a", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "name": "https://security.netapp.com/advisory/ntap-20210122-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "name": "DSA-4843", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "name": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.9.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29660" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" }, { "lang": "en", "value": "CWE-667" } ] } ] }, "references": { "reference_data": [ { "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9", "refsource": "MISC", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "name": "[oss-security] 20201210 2 kernel issues", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "name": "FEDORA-2020-bc0cc81a7a", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP/" }, { "name": "FEDORA-2020-b732958765", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL/" }, { "name": "https://security.netapp.com/advisory/ntap-20210122-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "name": "DSA-4843", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4843" }, { "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "name": "[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "name": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6 } }, "lastModifiedDate": "2021-11-30T22:21Z", "publishedDate": "2020-12-09T17:15Z" } } }
var-202012-1547
Vulnerability from variot
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24. Vendors must CID-c8bcd9c5be24 It is published as.Information may be obtained. Bugs fixed (https://bugzilla.redhat.com/):
2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value
- ========================================================================== Ubuntu Security Notice USN-4752-1 February 25, 2021
linux-oem-5.6 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux-oem-5.6: Linux kernel for OEM systems
Details:
Daniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered that legacy pairing and secure-connections pairing authentication in the Bluetooth protocol could allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. A physically proximate attacker could use this to impersonate a previously paired Bluetooth device. (CVE-2020-10135)
Jay Shin discovered that the ext4 file system implementation in the Linux kernel did not properly handle directory access with broken indexing, leading to an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-14314)
It was discovered that the block layer implementation in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-15436)
It was discovered that the serial port driver in the Linux kernel did not properly initialize a pointer in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2020-15437)
Andy Nguyen discovered that the Bluetooth HCI event packet parser in the Linux kernel did not properly handle event advertisements of certain sizes, leading to a heap-based buffer overflow. A physically proximate remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-24490)
It was discovered that the NFS client implementation in the Linux kernel did not properly perform bounds checking before copying security labels in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-25212)
It was discovered that the Rados block device (rbd) driver in the Linux kernel did not properly perform privilege checks for access to rbd devices in some situations. A local attacker could use this to map or unmap rbd block devices. A local attacker could use this to cause a denial of service. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A privileged attacker could use this to cause a denial of service (kernel memory exhaustion). A local attacker in a guest VM could possibly use this to cause a denial of service (host system crash). A local attacker could use this to possibly cause a denial of service (system crash). A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-28588)
It was discovered that the framebuffer implementation in the Linux kernel did not properly perform range checks in certain situations. A local attacker could use this to expose sensitive information (kernel memory). A local attacker could use this to gain unintended write access to read-only memory pages. (CVE-2020-29368)
Jann Horn discovered that the mmap implementation in the Linux kernel contained a race condition when handling munmap() operations, leading to a read-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information. (CVE-2020-29369)
Jann Horn discovered that the romfs file system in the Linux kernel did not properly validate file system meta-data, leading to an out-of-bounds read. An attacker could use this to construct a malicious romfs image that, when mounted, exposed sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly expose sensitive information (kernel memory). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2020-29661)
It was discovered that a race condition existed that caused the Linux kernel to not properly restrict exit signal delivery. A local attacker could possibly use this to send signals to arbitrary processes. (CVE-2020-35508)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: linux-image-5.6.0-1048-oem 5.6.0-1048.52 linux-image-oem-20.04 5.6.0.1048.44
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.
References: https://usn.ubuntu.com/4752-1 CVE-2020-10135, CVE-2020-14314, CVE-2020-15436, CVE-2020-15437, CVE-2020-24490, CVE-2020-25212, CVE-2020-25284, CVE-2020-25641, CVE-2020-25643, CVE-2020-25704, CVE-2020-27152, CVE-2020-27815, CVE-2020-28588, CVE-2020-28915, CVE-2020-29368, CVE-2020-29369, CVE-2020-29371, CVE-2020-29660, CVE-2020-29661, CVE-2020-35508
Package Information: https://launchpad.net/ubuntu/+source/linux-oem-5.6/5.6.0-1048.52 . Summary:
An update is now available for OpenShift Logging 5.3.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Description:
Openshift Logging Bug Fix Release (5.3.0)
Security Fix(es):
- golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html
For Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:
https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html
- Bugs fixed (https://bugzilla.redhat.com/):
1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment
- JIRA issues fixed (https://issues.jboss.org/):
LOG-1168 - Disable hostname verification in syslog TLS settings
LOG-1235 - Using HTTPS without a secret does not translate into the correct 'scheme' value in Fluentd
LOG-1375 - ssl_ca_cert should be optional
LOG-1378 - CLO should support sasl_plaintext(Password over http)
LOG-1392 - In fluentd config, flush_interval can't be set with flush_mode=immediate
LOG-1494 - Syslog output is serializing json incorrectly
LOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server
LOG-1575 - Rejected by Elasticsearch and unexpected json-parsing
LOG-1735 - Regression introducing flush_at_shutdown
LOG-1774 - The collector logs should be excluded in fluent.conf
LOG-1776 - fluentd total_limit_size sets value beyond available space
LOG-1822 - OpenShift Alerting Rules Style-Guide Compliance
LOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled
LOG-1862 - Unsupported kafka parameters when enabled Kafka SASL
LOG-1903 - Fix the Display of ClusterLogging type in OLM
LOG-1911 - CLF API changes to Opt-in to multiline error detection
LOG-1918 - Alert FluentdNodeDown
always firing
LOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYZJxoNzjgjWX9erEAQji2Q//bv8hVZq0D8Dz0Do5vdoPzpjDhM6wJr7U 3CqAqcxniXvHVbBiPHPsY3p3M62FSO5lg4oZnVfokEtrZmLe9ULZWLlNxVilAUCT 0urKKWCAIXF+QJcW9/KCuIfaMh8Mmvh2baq52azauCHCJ3UK9ontiGWqyUz/aq9F TM4P/eehnUU1WXAz9x4ycHP7fHZBuADkI8WOUZ5M/QpcoEvo7rLFdyat5MpMkeJx j7gGieb2ITvblxEML3LRdPljQxe56w7p2jC/EoXJnssjABozlWB936Ub/QSulGuz +HQS+RnAGxRRpNcs1wNQzpIkCFJN2S0jlEj5VLB8xLbZTYtILWhIx4rlwaFy6NJn /z7hpEfSAgmhPTejshI/2Gfu/sc+KStEJk2IasWO1wqQWRqYGVeLwgHxBt2wpX+I XJUjhkAdhAWyDfEhPXzpbN4dhmDk0QiGfL3KWZ8nO54IFQgZHT1P1YArnI1hMWC7 JhTyj1DtFOKJl8X28wf6RNui+ifD12hmIAuQRuJTPjZbTnywwpMy+Sq9mrfeHztb gPt2AqOPF5ksNB6OsjVKlMScLlLJzzlkBVgmurXaly0z2qLjy0Rl70oWeMOW4xUD 4Ravk3PLEMqSIHv0ECr4ku5ejMV1Rd46USrgVX2R0CALXIxPkk1IEN8hHmzIGz2D HHJuAvrlroc= =di1X -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . If you are running a kernel version earlier than the one listed below, please upgrade your kernel as soon as possible. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-4843-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso February 01, 2021 https://www.debian.org/security/faq
Package : linux CVE ID : CVE-2020-27815 CVE-2020-27825 CVE-2020-27830 CVE-2020-28374 CVE-2020-29568 CVE-2020-29569 CVE-2020-29660 CVE-2020-29661 CVE-2020-36158 CVE-2021-3347 CVE-2021-20177 Debian Bug : 970736 972345 977048 977615
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2020-27825
Adam 'pi3' Zabrocki reported a use-after-free flaw in the ftrace
ring buffer resizing logic due to a race condition, which could
result in denial of service or information leak.
CVE-2020-27830
Shisong Qin reported a NULL pointer dereference flaw in the Speakup
screen reader core driver.
CVE-2020-28374
David Disseldorp discovered that the LIO SCSI target implementation
performed insufficient checking in certain XCOPY requests. An
attacker with access to a LUN and knowledge of Unit Serial Number
assignments can take advantage of this flaw to read and write to any
LIO backstore, regardless of the SCSI transport settings.
CVE-2020-29568 (XSA-349)
Michael Kurth and Pawel Wieczorkiewicz reported that frontends can
trigger OOM in backends by updating a watched path. A
misbehaving guest can trigger a dom0 crash by continuously
connecting / disconnecting a block frontend.
CVE-2020-36158
A buffer overflow flaw was discovered in the mwifiex WiFi driver
which could result in denial of service or the execution of
arbitrary code via a long SSID value. A privileged user (with root or CAP_NET_ADMIN) can
take advantage of this flaw to cause a kernel panic when inserting
iptables rules.
For the stable distribution (buster), these problems have been fixed in version 4.19.171-2.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmAXj9pfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Tf5Q//RdQojeX7VtJ61PsVXRszZh9DJ3PUo64NheFU+QWUYO7F6NUD3fMxiS9K I8Sgfsm28x7RBambjW6TZYseJhQd9aSvaANnPdUj/eZ9P3xBhXFM8wzISosUWgfO 2IIV40oOVj943+BzfIQiq1mgQtwLjh3pNTZAEpjnzD96Tc9tXGyW9/3iGkUHIQjv gUTSvoLIUAI4XfNNUjnok+6kPDyEEIdiwJaGDG+UPZ6HNL/hrG3A4klQc+X7KK5K NCOzl4Wl5pZN7u2Ietn3sFMsNJkMrsfLlVyj8J9PgNwbFQh/+RuvzFcONlQ8iaD9 kx42gkLwjl+hM2UeCpvQndzwqXKPKc6CjFemDj7KWzVA+KkVBRTXCGb9K9CasZOZ 0e/cu+5rjYGubIE3e/jo3Gmhp/fm9fXHESbruxuP+gjdbKcyrGrokNucjRvp6FPP rCX+e7OjsZwWGBIcAw+gDAZkDO7PFEoRtlByF2LmxxNvTufZQZHX8NwVyABCdpZi VQLLeQNXN1pJ4d1NPWgTlKfEmH0sGVQRHCliTkBZmIjvo+y1JClUDBAlWOS4YYQL 4Z4oe1qtOX9z+NkqDqcbgfWw69Q2PipNN3TR5YcBXvOtVhvL+/WFGiooJDqxkdCD j3wO/r/1gut/bK/OJnjmOB9J5OXP+cHxYtrhPqXFy2Hzkgj1CRU= =u23W -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-1547", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "solidfire baseboard management controller", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fabric operating system", "scope": "eq", "trust": 1.0, "vendor": "broadcom", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "a700s", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "8700", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "a400", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "8300", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "33" }, { "model": "h410c", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "active iq unified manager", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "kernel", "scope": "lte", "trust": 1.0, "vendor": "linux", "version": "5.9.13" }, { "model": "kernel", "scope": null, "trust": 0.8, "vendor": "linux", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "NVD", "id": "CVE-2020-29660" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.9.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:a700s_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:a700s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:8300_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:8300:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:8700_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:8700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:a400_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:a400:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-29660" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "161551" }, { "db": "PACKETSTORM", "id": "161553" }, { "db": "PACKETSTORM", "id": "161556" }, { "db": "PACKETSTORM", "id": "161555" }, { "db": "PACKETSTORM", "id": "164812" }, { "db": "CNNVD", "id": "CNNVD-202012-776" } ], "trust": 1.1 }, "cve": "CVE-2020-29660", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-29660", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.4, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-29660", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-29660", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202012-776", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-29660", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-29660" }, { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "CNNVD", "id": "CNNVD-202012-776" }, { "db": "NVD", "id": "CVE-2020-29660" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24. Vendors must CID-c8bcd9c5be24 It is published as.Information may be obtained. Bugs fixed (https://bugzilla.redhat.com/):\n\n2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value\n\n5. ==========================================================================\nUbuntu Security Notice USN-4752-1\nFebruary 25, 2021\n\nlinux-oem-5.6 vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux-oem-5.6: Linux kernel for OEM systems\n\nDetails:\n\nDaniele Antonioli, Nils Ole Tippenhauer, and Kasper Rasmussen discovered\nthat legacy pairing and secure-connections pairing authentication in the\nBluetooth protocol could allow an unauthenticated user to complete\nauthentication without pairing credentials via adjacent access. A\nphysically proximate attacker could use this to impersonate a previously\npaired Bluetooth device. (CVE-2020-10135)\n\nJay Shin discovered that the ext4 file system implementation in the Linux\nkernel did not properly handle directory access with broken indexing,\nleading to an out-of-bounds read vulnerability. A local attacker could use\nthis to cause a denial of service (system crash). (CVE-2020-14314)\n\nIt was discovered that the block layer implementation in the Linux kernel\ndid not properly perform reference counting in some situations, leading to\na use-after-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash). (CVE-2020-15436)\n\nIt was discovered that the serial port driver in the Linux kernel did not\nproperly initialize a pointer in some situations. A local attacker could\npossibly use this to cause a denial of service (system crash). \n(CVE-2020-15437)\n\nAndy Nguyen discovered that the Bluetooth HCI event packet parser in the\nLinux kernel did not properly handle event advertisements of certain sizes,\nleading to a heap-based buffer overflow. A physically proximate remote\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2020-24490)\n\nIt was discovered that the NFS client implementation in the Linux kernel\ndid not properly perform bounds checking before copying security labels in\nsome situations. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2020-25212)\n\nIt was discovered that the Rados block device (rbd) driver in the Linux\nkernel did not properly perform privilege checks for access to rbd devices\nin some situations. A local attacker could use this to map or unmap rbd\nblock devices. A local attacker could use this\nto cause a denial of service. A local attacker could use\nthis to cause a denial of service (system crash) or possibly execute\narbitrary code. A privileged attacker\ncould use this to cause a denial of service (kernel memory exhaustion). A local attacker in a\nguest VM could possibly use this to cause a denial of service (host system\ncrash). A local attacker\ncould use this to possibly cause a denial of service (system crash). A local attacker\ncould use this to expose sensitive information (kernel memory). \n(CVE-2020-28588)\n\nIt was discovered that the framebuffer implementation in the Linux kernel\ndid not properly perform range checks in certain situations. A local\nattacker could use this to expose sensitive information (kernel memory). A local attacker could use\nthis to gain unintended write access to read-only memory pages. \n(CVE-2020-29368)\n\nJann Horn discovered that the mmap implementation in the Linux kernel\ncontained a race condition when handling munmap() operations, leading to a\nread-after-free vulnerability. A local attacker could use this to cause a\ndenial of service (system crash) or possibly expose sensitive information. \n(CVE-2020-29369)\n\nJann Horn discovered that the romfs file system in the Linux kernel did not\nproperly validate file system meta-data, leading to an out-of-bounds read. \nAn attacker could use this to construct a malicious romfs image that, when\nmounted, exposed sensitive information (kernel memory). A local attacker could use this to cause a denial of service\n(system crash) or possibly expose sensitive information (kernel memory). A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code. (CVE-2020-29661)\n\nIt was discovered that a race condition existed that caused the Linux\nkernel to not properly restrict exit signal delivery. A local attacker\ncould possibly use this to send signals to arbitrary processes. \n(CVE-2020-35508)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.04 LTS:\n linux-image-5.6.0-1048-oem 5.6.0-1048.52\n linux-image-oem-20.04 5.6.0.1048.44\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well. \n\nReferences:\n https://usn.ubuntu.com/4752-1\n CVE-2020-10135, CVE-2020-14314, CVE-2020-15436, CVE-2020-15437,\n CVE-2020-24490, CVE-2020-25212, CVE-2020-25284, CVE-2020-25641,\n CVE-2020-25643, CVE-2020-25704, CVE-2020-27152, CVE-2020-27815,\n CVE-2020-28588, CVE-2020-28915, CVE-2020-29368, CVE-2020-29369,\n CVE-2020-29371, CVE-2020-29660, CVE-2020-29661, CVE-2020-35508\n\nPackage Information:\n https://launchpad.net/ubuntu/+source/linux-oem-5.6/5.6.0-1048.52\n. Summary:\n\nAn update is now available for OpenShift Logging 5.3. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Description:\n\nOpenshift Logging Bug Fix Release (5.3.0)\n\nSecurity Fix(es):\n\n* golang: x/net/html: infinite loop in ParseFragment (CVE-2021-33194)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n3. Solution:\n\nFor OpenShift Container Platform 4.9 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply\nthis update:\n\nhttps://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1963232 - CVE-2021-33194 golang: x/net/html: infinite loop in ParseFragment\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-1168 - Disable hostname verification in syslog TLS settings\nLOG-1235 - Using HTTPS without a secret does not translate into the correct \u0027scheme\u0027 value in Fluentd\nLOG-1375 - ssl_ca_cert should be optional\nLOG-1378 - CLO should support sasl_plaintext(Password over http)\nLOG-1392 - In fluentd config, flush_interval can\u0027t be set with flush_mode=immediate\nLOG-1494 - Syslog output is serializing json incorrectly\nLOG-1555 - Fluentd logs emit transaction failed: error_class=NoMethodError while forwarding to external syslog server\nLOG-1575 - Rejected by Elasticsearch and unexpected json-parsing\nLOG-1735 - Regression introducing flush_at_shutdown \nLOG-1774 - The collector logs should be excluded in fluent.conf\nLOG-1776 - fluentd total_limit_size sets value beyond available space\nLOG-1822 - OpenShift Alerting Rules Style-Guide Compliance\nLOG-1859 - CLO Should not error and exit early on missing ca-bundle when cluster wide proxy is not enabled\nLOG-1862 - Unsupported kafka parameters when enabled Kafka SASL\nLOG-1903 - Fix the Display of ClusterLogging type in OLM\nLOG-1911 - CLF API changes to Opt-in to multiline error detection\nLOG-1918 - Alert `FluentdNodeDown` always firing \nLOG-1939 - Opt-in multiline detection breaks cloudwatch forwarding\n\n6. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nHHJuAvrlroc=\n=di1X\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. If you are running a kernel version earlier than the one listed\nbelow, please upgrade your kernel as soon as possible. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4843-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nFebruary 01, 2021 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2020-27815 CVE-2020-27825 CVE-2020-27830 CVE-2020-28374\n CVE-2020-29568 CVE-2020-29569 CVE-2020-29660 CVE-2020-29661\n CVE-2020-36158 CVE-2021-3347 CVE-2021-20177\nDebian Bug : 970736 972345 977048 977615\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks. \n\nCVE-2020-27825\n\n Adam \u0027pi3\u0027 Zabrocki reported a use-after-free flaw in the ftrace\n ring buffer resizing logic due to a race condition, which could\n result in denial of service or information leak. \n\nCVE-2020-27830\n\n Shisong Qin reported a NULL pointer dereference flaw in the Speakup\n screen reader core driver. \n\nCVE-2020-28374\n\n David Disseldorp discovered that the LIO SCSI target implementation\n performed insufficient checking in certain XCOPY requests. An\n attacker with access to a LUN and knowledge of Unit Serial Number\n assignments can take advantage of this flaw to read and write to any\n LIO backstore, regardless of the SCSI transport settings. \n\nCVE-2020-29568 (XSA-349)\n\n Michael Kurth and Pawel Wieczorkiewicz reported that frontends can\n trigger OOM in backends by updating a watched path. A\n misbehaving guest can trigger a dom0 crash by continuously\n connecting / disconnecting a block frontend. \n\nCVE-2020-36158\n\n A buffer overflow flaw was discovered in the mwifiex WiFi driver\n which could result in denial of service or the execution of\n arbitrary code via a long SSID value. A privileged user (with root or CAP_NET_ADMIN) can\n take advantage of this flaw to cause a kernel panic when inserting\n iptables rules. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 4.19.171-2. \n\nWe recommend that you upgrade your linux packages. \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nj3wO/r/1gut/bK/OJnjmOB9J5OXP+cHxYtrhPqXFy2Hzkgj1CRU=\n=u23W\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2020-29660" }, { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "VULMON", "id": "CVE-2020-29660" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "161551" }, { "db": "PACKETSTORM", "id": "161553" }, { "db": "PACKETSTORM", "id": "161556" }, { "db": "PACKETSTORM", "id": "161555" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "PACKETSTORM", "id": "164950" }, { "db": "PACKETSTORM", "id": "164812" }, { "db": "PACKETSTORM", "id": "169012" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-29660", "trust": 4.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/12/10/1", "trust": 2.5 }, { "db": "PACKETSTORM", "id": "164950", "trust": 1.8 }, { "db": "ICS CERT", "id": "ICSA-24-074-07", "trust": 0.8 }, { "db": "JVN", "id": "JVNVU93656033", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-014189", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "161556", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "164812", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2021.3905", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0189", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0837", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0717", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0589", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0166", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4254", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3871", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0348", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3825", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "164875", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021100407", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202012-776", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-29660", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "165296", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161551", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161553", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "161555", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "164967", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169012", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-29660" }, { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "161551" }, { "db": "PACKETSTORM", "id": "161553" }, { "db": "PACKETSTORM", "id": "161556" }, { "db": "PACKETSTORM", "id": "161555" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "PACKETSTORM", "id": "164950" }, { "db": "PACKETSTORM", "id": "164812" }, { "db": "PACKETSTORM", "id": "169012" }, { "db": "CNNVD", "id": "CNNVD-202012-776" }, { "db": "NVD", "id": "CVE-2020-29660" } ] }, "id": "VAR-202012-1547", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.625 }, "last_update_date": "2024-07-23T22:10:23.557000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Fix\u00a0-\u003esession\u00a0locking", "trust": 0.8, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/bob25su6xul4tnp7kb63wnzsytiyfdpp/" }, { "title": "Linux kernel Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137670" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-29660 log" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-032", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2livepatch-2021-032" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-031", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2livepatch-2021-031" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-034", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2livepatch-2021-034" }, { "title": "Amazon Linux 2: ALAS2LIVEPATCH-2021-033", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2livepatch-2021-033" }, { "title": "Amazon Linux AMI: ALAS-2021-1477", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2021-1477" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-019", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2kernel-5.4-2022-019" }, { "title": "Debian Security Advisories: DSA-4843-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=b95030247235becf9e017bec31e9d503" }, { "title": "Amazon Linux 2: ALAS2-2021-1588", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=alas2-2021-1588" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=ec6577109e640dac19a6ddb978afe82d" }, { "title": "cve_diff_checker", "trust": 0.1, "url": "https://github.com/lcatro/cve_diff_checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-29660" }, { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "CNNVD", "id": "CNNVD-202012-776" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.0 }, { "problemtype": "CWE-667", "trust": 1.0 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " improper lock (CWE-667) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "NVD", "id": "CVE-2020-29660" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" }, { "trust": 2.3, "url": "http://packetstormsecurity.com/files/164950/kernel-live-patch-security-notice-lsn-0082-1.html" }, { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29660" }, { "trust": 1.7, "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20210122-0001/" }, { "trust": 1.7, "url": "https://www.debian.org/security/2021/dsa-4843" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/mz7oakaefaxqrgbzk4lyuwincd3d2xcl/" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/bob25su6xul4tnp7kb63wnzsytiyfdpp/" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu93656033/index.html" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29661" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/mz7oakaefaxqrgbzk4lyuwincd3d2xcl/" }, { "trust": 0.6, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/bob25su6xul4tnp7kb63wnzsytiyfdpp/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202111-0000001172568432" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0837" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0717" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164875/red-hat-security-advisory-2021-4140-02.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0589" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0348/" }, { "trust": 0.6, "url": "https://source.android.com/security/bulletin/2021-10-01" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3825" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3871" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/164812/ubuntu-security-notice-usn-5130-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0166/" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021100407" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4254" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/linux-kernel-use-after-free-via-tiocgsid-34081" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0189/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/161556/ubuntu-security-notice-usn-4752-1.html" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27815" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29568" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28588" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29569" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24504" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-27777" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20239" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36158" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-16135" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3200" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35448" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3635" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25013" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20284" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25012" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35522" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-5827" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36386" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35524" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-20673" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0427" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25013" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24586" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3348" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25009" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-27645" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33574" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26140" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3487" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-13435" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26146" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-31440" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-5827" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3732" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24370" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-0129" }, { "trust": 0.2, "url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14145" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-13751" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10001" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24502" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25014" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3564" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-0427" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23133" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-19603" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14145" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25012" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26144" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35521" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3679" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-35942" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-17594" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36312" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24370" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3572" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-12762" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36086" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-29368" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3778" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13750" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-13751" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22898" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24588" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-29646" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-29155" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12762" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-16135" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36084" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-17541" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3489" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3800" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17594" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36087" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36331" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-29660" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-31535" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26139" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-28971" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23841" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-14615" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26143" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3445" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3600" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13435" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-19603" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22925" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26145" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-20673" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-23840" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33200" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36330" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-29650" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33033" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-18218" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20194" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26147" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20232" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-31916" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20266" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-20838" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-22876" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20231" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-36332" }, { "trust": 0.2, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-14155" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25010" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-20838" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-17541" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-10001" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24503" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-25014" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-36085" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-14615" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-33560" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24502" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-17595" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3481" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-42574" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14155" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25009" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-25010" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35523" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-31829" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-28153" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3573" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-13750" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-20197" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-26141" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3426" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-28950" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2019-18218" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3580" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3796" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-17595" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24587" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24503" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2021-3659" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-20177" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25669" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25704" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35508" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27830" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/667.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2020-29660" }, { "trust": 0.1, "url": "https://alas.aws.amazon.com/al2/alaslivepatch-2021-032.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/vulnerabilities/rhsb-2021-009" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-43527" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-44228" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3712" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:5137" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1122.136" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/4.4.0-203.235" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4748-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1088.97" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1146.156" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1150.160" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29374" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1038.41" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28941" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1038.40" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop-5.4/5.4.0-1010.11~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1040.42" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4750-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp-5.4/5.4.0-1037.40~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle-5.4/5.4.0-1038.41~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1037.40" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1033.34" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gke-5.4/5.4.0-1036.38~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi-5.4/5.4.0-1029.32~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.4.0-66.74" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.4/5.4.0-66.74~18.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure-5.4/5.4.0-1040.42~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.4.0-1029.32" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws-5.4/5.4.0-1038.40~18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gkeop/5.4.0-1010.11" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4752-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25212" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15436" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24490" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10135" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25641" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15437" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oem-5.6/5.6.0-1048.52" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29369" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27152" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28915" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25643" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-14314" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29371" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-29368" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27673" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25656" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-44.50~20.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28974" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27777" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-25668" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27675" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1019.21" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1023.24" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1024.26" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-raspi/5.8.0-1016.19" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1021.22" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27835" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/5.8.0-44.50" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4751-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1023.25" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.9/release_notes/ocp-4-9-release-notes.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-33194" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:4627" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3715" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3444" }, { "trust": 0.1, "url": "https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-5130-1" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3347" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27825" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36158" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-28374" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-29660" }, { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "161551" }, { "db": "PACKETSTORM", "id": "161553" }, { "db": "PACKETSTORM", "id": "161556" }, { "db": "PACKETSTORM", "id": "161555" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "PACKETSTORM", "id": "164950" }, { "db": "PACKETSTORM", "id": "164812" }, { "db": "PACKETSTORM", "id": "169012" }, { "db": "CNNVD", "id": "CNNVD-202012-776" }, { "db": "NVD", "id": "CVE-2020-29660" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-29660" }, { "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "db": "PACKETSTORM", "id": "165296" }, { "db": "PACKETSTORM", "id": "161551" }, { "db": "PACKETSTORM", "id": "161553" }, { "db": "PACKETSTORM", "id": "161556" }, { "db": "PACKETSTORM", "id": "161555" }, { "db": "PACKETSTORM", "id": "164967" }, { "db": "PACKETSTORM", "id": "164950" }, { "db": "PACKETSTORM", "id": "164812" }, { "db": "PACKETSTORM", "id": "169012" }, { "db": "CNNVD", "id": "CNNVD-202012-776" }, { "db": "NVD", "id": "CVE-2020-29660" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-12-09T00:00:00", "db": "VULMON", "id": "CVE-2020-29660" }, { "date": "2021-08-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "date": "2021-12-15T15:27:05", "db": "PACKETSTORM", "id": "165296" }, { "date": "2021-02-25T15:30:28", "db": "PACKETSTORM", "id": "161551" }, { "date": "2021-02-25T15:30:47", "db": "PACKETSTORM", "id": "161553" }, { "date": "2021-02-25T15:31:12", "db": "PACKETSTORM", "id": "161556" }, { "date": "2021-02-25T15:31:02", "db": "PACKETSTORM", "id": "161555" }, { "date": "2021-11-15T17:25:56", "db": "PACKETSTORM", "id": "164967" }, { "date": "2021-11-12T17:07:48", "db": "PACKETSTORM", "id": "164950" }, { "date": "2021-11-09T16:59:39", "db": "PACKETSTORM", "id": "164812" }, { "date": "2021-02-28T20:12:00", "db": "PACKETSTORM", "id": "169012" }, { "date": "2020-12-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-776" }, { "date": "2020-12-09T17:15:31.743000", "db": "NVD", "id": "CVE-2020-29660" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2020-29660" }, { "date": "2024-03-22T07:17:00", "db": "JVNDB", "id": "JVNDB-2020-014189" }, { "date": "2021-12-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-776" }, { "date": "2023-11-07T03:21:33.123000", "db": "NVD", "id": "CVE-2020-29660" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "161551" }, { "db": "PACKETSTORM", "id": "161553" }, { "db": "PACKETSTORM", "id": "161556" }, { "db": "PACKETSTORM", "id": "161555" }, { "db": "PACKETSTORM", "id": "164950" }, { "db": "PACKETSTORM", "id": "164812" }, { "db": "CNNVD", "id": "CNNVD-202012-776" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux\u00a0Kernel\u00a0 Vulnerability in using free memory in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014189" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-776" } ], "trust": 0.6 } }
rhsa-2021_4356
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c (CVE-2021-28971)\n* kernel: protection can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c (CVE-2021-29646)\n* kernel: lack a full memory barrier may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50 (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4356", "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1509204", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509204" }, { "category": "external", "summary": "1793880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1793880" }, { "category": "external", "summary": "1816493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1816493" }, { "category": "external", "summary": "1894101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1894101" }, { "category": "external", "summary": "1900844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844" }, { "category": "external", "summary": "1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "1915825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915825" }, { "category": "external", "summary": "1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "1933527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933527" }, { "category": "external", "summary": "1939341", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1939341" }, { "category": "external", "summary": "1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "1953847", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953847" }, { "category": "external", "summary": "1954588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954588" }, { "category": "external", "summary": "1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "1960708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960708" }, { "category": "external", "summary": "1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "1965360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965360" }, { "category": "external", "summary": "1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "1971101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1971101" }, { "category": "external", "summary": "1972278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1972278" }, { "category": "external", "summary": "1974627", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974627" }, { "category": "external", "summary": "1975182", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975182" }, { "category": "external", "summary": "1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "1976679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976679" }, { "category": "external", "summary": "1976699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976699" }, { "category": "external", "summary": "1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "1976969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976969" }, { "category": "external", "summary": "1977162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977162" }, { "category": "external", "summary": "1977422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977422" }, { "category": "external", "summary": "1977537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977537" }, { "category": "external", "summary": "1977850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1977850" }, { "category": "external", "summary": "1978369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978369" }, { "category": "external", "summary": "1979070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979070" }, { "category": "external", "summary": "1979680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1979680" }, { "category": "external", "summary": "1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "1986138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986138" }, { "category": "external", "summary": "1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "1989999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989999" }, { "category": "external", "summary": "1991976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991976" }, { "category": "external", "summary": "1992700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1992700" }, { "category": "external", "summary": "1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "1996854", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1996854" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4356.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-12-09T19:31:58+00:00", "generator": { "date": "2024-12-09T19:31:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2021:4356", "initial_release_date": "2021-11-09T18:06:54+00:00", "revision_history": [ { "date": "2021-11-09T18:06:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T18:06:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-09T19:31:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-348.el8.aarch64", "product_id": "bpftool-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-348.el8.aarch64", "product_id": "kernel-core-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.aarch64", "product": { "name": "perf-0:4.18.0-348.el8.aarch64", "product_id": "perf-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-348.el8.aarch64", "product_id": "python3-perf-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-348.el8.ppc64le", "product_id": "bpftool-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.ppc64le", "product": { "name": "perf-0:4.18.0-348.el8.ppc64le", "product_id": "perf-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-348.el8.x86_64", "product_id": "bpftool-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-348.el8.x86_64", "product_id": "kernel-core-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.x86_64", "product": { "name": "perf-0:4.18.0-348.el8.x86_64", "product_id": "perf-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-348.el8.x86_64", "product_id": "python3-perf-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-348.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-348.el8.s390x", "product": { "name": "bpftool-0:4.18.0-348.el8.s390x", "product_id": "bpftool-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-0:4.18.0-348.el8.s390x", "product_id": "kernel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-348.el8.s390x", "product_id": "kernel-headers-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-348.el8.s390x", "product_id": "kernel-tools-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-348.el8.s390x", "product": { "name": "perf-0:4.18.0-348.el8.s390x", "product_id": "perf-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-348.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-348.el8.s390x", "product_id": "python3-perf-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-348.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-348.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-348.el8.src", "product": { "name": "kernel-0:4.18.0-348.el8.src", "product_id": "kernel-0:4.18.0-348.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-348.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product_id": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-348.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-348.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-348.el8.noarch", "product_id": "kernel-doc-0:4.18.0-348.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-348.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src" }, "product_reference": "kernel-0:4.18.0-348.el8.src", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "BaseOS-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src" }, "product_reference": "kernel-0:4.18.0-348.el8.src", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-348.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-348.el8.noarch", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "relates_to_product_reference": "CRB-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "relates_to_product_reference": "CRB-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789209" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Intel graphics card information leak.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "RHBZ#1789209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Intel graphics card information leak." }, { "cve": "CVE-2020-0427", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919893" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads in pinctrl subsystem.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "RHBZ#1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427" } ], "release_date": "2020-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads in pinctrl subsystem." }, { "cve": "CVE-2020-24502", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930379" } ], "notes": [ { "category": "description", "text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24502" }, { "category": "external", "summary": "RHBZ#1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24503", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930381" } ], "notes": [ { "category": "description", "text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24503" }, { "category": "external", "summary": "RHBZ#1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24504", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930376" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24504" }, { "category": "external", "summary": "RHBZ#1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959642" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fragmentation cache not cleared on reconnection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "RHBZ#1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-12T01:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fragmentation cache not cleared on reconnection" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959654" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reassembling fragments encrypted under different keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "RHBZ#1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-11T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Reassembling fragments encrypted under different keys" }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959657" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "RHBZ#1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame" }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959663" } ], "notes": [ { "category": "description", "text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Forwarding EAPOL from unauthenticated wifi client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "RHBZ#1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Forwarding EAPOL from unauthenticated wifi client" }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960490" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext data frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26140" }, { "category": "external", "summary": "RHBZ#1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext data frames in protected networks" }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960492" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: not verifying TKIP MIC of fragmented frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "RHBZ#1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: not verifying TKIP MIC of fragmented frames" }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960496" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting fragmented plaintext frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26143" }, { "category": "external", "summary": "RHBZ#1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting fragmented plaintext frames in protected networks" }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960498" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26144" }, { "category": "external", "summary": "RHBZ#1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header" }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960500" } ], "notes": [ { "category": "description", "text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext broadcast fragments as full frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "RHBZ#1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext broadcast fragments as full frames" }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26146" }, { "category": "external", "summary": "RHBZ#1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers" }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960504" } ], "notes": [ { "category": "description", "text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling mixed encrypted/plaintext fragments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "RHBZ#1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling mixed encrypted/plaintext fragments" }, { "acknowledgments": [ { "names": [ "Daniel Axtens" ], "organization": "IBM" } ], "cve": "CVE-2020-27777", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2020-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1900844" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact due to the required privileges and hardware dependencies.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27777" }, { "category": "external", "summary": "RHBZ#1900844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1900844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27777", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27777" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27777" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next\u0026id=bd59380c5ba4147dcbaad3e582b55ccfd120b764" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/10/09/1", "url": "https://www.openwall.com/lists/oss-security/2020/10/09/1" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2020/11/23/2", "url": "https://www.openwall.com/lists/oss-security/2020/11/23/2" } ], "release_date": "2020-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: powerpc: RTAS calls can be used to compromise kernel integrity" }, { "cve": "CVE-2020-29368", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903244" } ], "notes": [ { "category": "description", "text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29368" }, { "category": "external", "summary": "RHBZ#1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368" } ], "release_date": "2020-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906522" } ], "notes": [ { "category": "description", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "RHBZ#1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free" }, { "cve": "CVE-2020-36158", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913348" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "RHBZ#1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value" }, { "cve": "CVE-2020-36312", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1947991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "RHBZ#1947991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312" } ], "release_date": "2020-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c" }, { "cve": "CVE-2020-36386", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1969489" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36386" }, { "category": "external", "summary": "RHBZ#1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c" }, { "cve": "CVE-2021-0129", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965038" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0129" }, { "category": "external", "summary": "RHBZ#1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129" } ], "release_date": "2021-06-08T03:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability." }, { "cve": "CVE-2021-3348", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921958" } ], "notes": [ { "category": "description", "text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "RHBZ#1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348" }, { "category": "external", "summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/", "url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c" }, { "acknowledgments": [ { "names": [ "Ryota Shiga" ] } ], "cve": "CVE-2021-3489", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959559" } ], "notes": [ { "category": "description", "text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "RHBZ#1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10", "url": "https://www.openwall.com/lists/oss-security/2021/05/11/10" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "cve": "CVE-2021-3600", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981954" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF 32-bit source register truncation on div/mod", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3600" }, { "category": "external", "summary": "RHBZ#1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600" }, { "category": "external", "summary": "https://lore.kernel.org/patchwork/patch/1379497/", "url": "https://lore.kernel.org/patchwork/patch/1379497/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1", "url": "https://www.openwall.com/lists/oss-security/2021/06/23/1" } ], "release_date": "2021-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF 32-bit source register truncation on div/mod" }, { "cve": "CVE-2021-3635", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1976946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3635" }, { "category": "external", "summary": "RHBZ#1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635" } ], "release_date": "2021-08-06T04:47:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50" }, { "cve": "CVE-2021-3659", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1975949" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3659" }, { "category": "external", "summary": "RHBZ#1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8" } ], "release_date": "2021-04-06T19:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c" }, { "acknowledgments": [ { "names": [ "Haoran Luo" ], "organization": "Chaitin Tech" } ], "cve": "CVE-2021-3679", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989165" } ], "notes": [ { "category": "description", "text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in rb_per_cpu_empty()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3679" }, { "category": "external", "summary": "RHBZ#1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/", "url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/" } ], "release_date": "2021-07-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in rb_per_cpu_empty()" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3732", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3732" }, { "category": "external", "summary": "RHBZ#1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files" }, { "cve": "CVE-2021-4442", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2308455" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: add sanity tests to TCP_QUEUE_SEQ\n\nQingyu Li reported a syzkaller bug where the repro\nchanges RCV SEQ _after_ restoring data in the receive queue.\n\nmprotect(0x4aa000, 12288, PROT_READ) = 0\nmmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000\nmmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000\nmmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000\nsocket(AF_INET6, SOCK_STREAM, IPPROTO_IP) = 3\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [1], 4) = 0\nconnect(3, {sa_family=AF_INET6, sin6_port=htons(0), sin6_flowinfo=htonl(0), inet_pton(AF_INET6, \"::1\", \u0026sin6_addr), sin6_scope_id=0}, 28) = 0\nsetsockopt(3, SOL_TCP, TCP_REPAIR_QUEUE, [1], 4) = 0\nsendmsg(3, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base=\"0x0000000000000003\\0\\0\", iov_len=20}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0) = 20\nsetsockopt(3, SOL_TCP, TCP_REPAIR, [0], 4) = 0\nsetsockopt(3, SOL_TCP, TCP_QUEUE_SEQ, [128], 4) = 0\nrecvfrom(3, NULL, 20, 0, NULL, NULL) = -1 ECONNRESET (Connection reset by peer)\n\nsyslog shows:\n[ 111.205099] TCP recvmsg seq # bug 2: copied 80, seq 0, rcvnxt 80, fl 0\n[ 111.207894] WARNING: CPU: 1 PID: 356 at net/ipv4/tcp.c:2343 tcp_recvmsg_locked+0x90e/0x29a0\n\nThis should not be allowed. TCP_QUEUE_SEQ should only be used\nwhen queues are empty.\n\nThis patch fixes this case, and the tx path as well.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is fixed in RHEL-8.5 and above\n~~~\nin (rhel-8.5, rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) tcp: add sanity tests to TCP_QUEUE_SEQ\n~~~", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-4442" }, { "category": "external", "summary": "RHBZ#2308455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308455" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-4442", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4442" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024082945-CVE-2021-4442-0a5f@gregkh/T" } ], "release_date": "2024-08-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: tcp: add sanity tests to TCP_QUEUE_SEQ" }, { "acknowledgments": [ { "names": [ "Loris Reiff" ] } ], "cve": "CVE-2021-20194", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912683" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20194" }, { "category": "external", "summary": "RHBZ#1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194" } ], "release_date": "2021-01-22T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()" }, { "cve": "CVE-2021-20239", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1923636" } ], "notes": [ { "category": "description", "text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20239" }, { "category": "external", "summary": "RHBZ#1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20239" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239" } ], "release_date": "2021-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-23133", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1948772" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sctp_destroy_sock list_del", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "RHBZ#1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" } ], "release_date": "2021-04-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sctp_destroy_sock list_del" }, { "cve": "CVE-2021-28950", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941762" } ], "notes": [ { "category": "description", "text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "RHBZ#1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode" }, { "cve": "CVE-2021-28971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941784" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "RHBZ#1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c" }, { "cve": "CVE-2021-29155", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951595" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29155" }, { "category": "external", "summary": "RHBZ#1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4", "url": "https://www.openwall.com/lists/oss-security/2021/04/18/4" } ], "release_date": "2021-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-29646", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945345" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29646" }, { "category": "external", "summary": "RHBZ#1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c" }, { "cve": "CVE-2021-29650", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945388" } ], "notes": [ { "category": "description", "text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29650" }, { "category": "external", "summary": "RHBZ#1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS" }, { "acknowledgments": [ { "names": [ "Manfred Paul" ], "organization": "RedRocket CTF team" } ], "cve": "CVE-2021-31440", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964028" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local escalation of privileges in handling of eBPF programs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31440" }, { "category": "external", "summary": "RHBZ#1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36" }, { "category": "external", "summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier", "url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: local escalation of privileges in handling of eBPF programs" }, { "cve": "CVE-2021-31829", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1957788" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31829" }, { "category": "external", "summary": "RHBZ#1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31829" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829" } ], "release_date": "2021-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-31916", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946965" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31916" }, { "category": "external", "summary": "RHBZ#1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a", "url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2021/q1/268", "url": "https://seclists.org/oss-sec/2021/q1/268" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c" }, { "cve": "CVE-2021-33033", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961300" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c", "title": "Vulnerability summary" }, { "category": "other", "text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33033" }, { "category": "external", "summary": "RHBZ#1961300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c" }, { "cve": "CVE-2021-33098", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-11-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2068236" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. This flaw allows an attacker who can modify the MTU of a virtualized PCIe device (in a guest, for example) to crash the host system\u2019s kernel if they set the MTU of the VF device to an unsupported value.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33098" }, { "category": "external", "summary": "RHBZ#2068236", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2068236" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33098", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33098" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33098" } ], "release_date": "2021-11-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in the Intel(R) Ethernet ixgbe driver may allow an authenticated user to potentially enable DoS via local access" }, { "cve": "CVE-2021-33200", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965458" } ], "notes": [ { "category": "description", "text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "RHBZ#1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/27/1" } ], "release_date": "2021-05-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier" }, { "cve": "CVE-2021-46905", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266253" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL-deref on disconnect regression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46905" }, { "category": "external", "summary": "RHBZ#2266253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46905" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T" } ], "release_date": "2024-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL-deref on disconnect regression" }, { "cve": "CVE-2021-46983", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266906" } ], "notes": [ { "category": "description", "text": "A flaw was found in an error-handling function in the Linux kernel\u0027s NVMe driver. This flaw allows an attacker with control over NVMe links to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46983" }, { "category": "external", "summary": "RHBZ#2266906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46983", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46983" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024022824-CVE-2021-46983-f808@gregkh/T/#u" } ], "release_date": "2024-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nvmet-rdma: Fix NULL deref when SEND is completed with error" }, { "cve": "CVE-2021-47080", "cwe": { "id": "CWE-369", "name": "Divide By Zero" }, "discovery_date": "2024-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2267533" } ], "notes": [ { "category": "description", "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Prevent divide-by-zero error triggered by the user\n\nThe user_entry_size is supplied by the user and later used as a\ndenominator to calculate number of entries. The zero supplied by the user\nwill trigger the following divide-by-zero error:\n\n divide error: 0000 [#1] SMP KASAN PTI\n CPU: 4 PID: 497 Comm: c_repro Not tainted 5.13.0-rc1+ #281\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:ib_uverbs_handler_UVERBS_METHOD_QUERY_GID_TABLE+0x1b1/0x510\n Code: 87 59 03 00 00 e8 9f ab 1e ff 48 8d bd a8 00 00 00 e8 d3 70 41 ff 44 0f b7 b5 a8 00 00 00 e8 86 ab 1e ff 31 d2 4c 89 f0 31 ff \u003c49\u003e f7 f5 48 89 d6 48 89 54 24 10 48 89 04 24 e8 1b ad 1e ff 48 8b\n RSP: 0018:ffff88810416f828 EFLAGS: 00010246\n RAX: 0000000000000008 RBX: 1ffff1102082df09 RCX: ffffffff82183f3d\n RDX: 0000000000000000 RSI: ffff888105f2da00 RDI: 0000000000000000\n RBP: ffff88810416fa98 R08: 0000000000000001 R09: ffffed102082df5f\n R10: ffff88810416faf7 R11: ffffed102082df5e R12: 0000000000000000\n R13: 0000000000000000 R14: 0000000000000008 R15: ffff88810416faf0\n FS: 00007f5715efa740(0000) GS:ffff88811a700000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000020000840 CR3: 000000010c2e0001 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? ib_uverbs_handler_UVERBS_METHOD_INFO_HANDLES+0x4b0/0x4b0\n ib_uverbs_cmd_verbs+0x1546/0x1940\n ib_uverbs_ioctl+0x186/0x240\n __x64_sys_ioctl+0x38a/0x1220\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-47080" }, { "category": "external", "summary": "RHBZ#2267533", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267533" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-47080", "url": "https://www.cve.org/CVERecord?id=CVE-2021-47080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47080" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u", "url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47080-eb20@gregkh/T/#u" } ], "release_date": "2024-03-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: RDMA/core: Prevent divide-by-zero error triggered by the user" }, { "cve": "CVE-2022-20166", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122089" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible buffer overflow in sysfs reading", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-20166" }, { "category": "external", "summary": "RHBZ#2122089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166" } ], "release_date": "2022-08-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T18:06:54+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2021:4356" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "BaseOS-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "BaseOS-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:bpftool-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.src", "CRB-8.5.0.GA:kernel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-abi-stablelists-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-cross-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-core-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debug-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-doc-0:4.18.0-348.el8.noarch", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-headers-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-modules-extra-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-tools-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:kernel-tools-libs-devel-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:kernel-zfcpdump-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-core-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-devel-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:perf-debuginfo-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-0:4.18.0-348.el8.x86_64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.aarch64", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.ppc64le", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.s390x", "CRB-8.5.0.GA:python3-perf-debuginfo-0:4.18.0-348.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible buffer overflow in sysfs reading" } ] }
rhsa-2021_4140
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427)\n* kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24502)\n* kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24503)\n* kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers (CVE-2020-24504)\n* kernel: Fragmentation cache not cleared on reconnection (CVE-2020-24586)\n* kernel: Reassembling fragments encrypted under different keys (CVE-2020-24587)\n* kernel: wifi frame payload being parsed incorrectly as an L2 frame (CVE-2020-24588)\n* kernel: Forwarding EAPOL from unauthenticated wifi client (CVE-2020-26139)\n* kernel: accepting plaintext data frames in protected networks (CVE-2020-26140)\n* kernel: not verifying TKIP MIC of fragmented frames (CVE-2020-26141)\n* kernel: accepting fragmented plaintext frames in protected networks (CVE-2020-26143)\n* kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header (CVE-2020-26144)\n* kernel: accepting plaintext broadcast fragments as full frames (CVE-2020-26145)\n* kernel: locking inconsistency in tty_io.c and tty_jobctrl.c can lead to a read-after-free (CVE-2020-29660)\n* kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function via a long SSID value (CVE-2020-36158)\n* kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() (CVE-2020-36386)\n* kernel: Improper access control in BlueZ may allow information disclosure vulnerability. (CVE-2021-0129)\n* kernel: Use-after-free in ndb_queue_rq() (CVE-2021-3348)\n* kernel: Linux kernel eBPF RINGBUF map oversized allocation (CVE-2021-3489)\n* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564)\n* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573)\n* kernel: eBPF 32-bit source register truncation on div/mod (CVE-2021-3600)\n* kernel: DoS in rb_per_cpu_empty() (CVE-2021-3679)\n* kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files (CVE-2021-3732)\n* kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt() (CVE-2021-20194)\n* kernel: Race condition in sctp_destroy_sock list_del (CVE-2021-23133)\n* kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode (CVE-2021-28950)\n* kernel: System crash in intel_pmu_drain_pebs_nhm (CVE-2021-28971)\n* kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory (CVE-2021-29155)\n* kernel: improper input validation in tipc_nl_retrieve_key function (CVE-2021-29646)\n* kernel: lack a full memory barrier upon the assignment of a new table value in x_tables.h may lead to DoS (CVE-2021-29650)\n* kernel: local escalation of privileges in handling of eBPF programs (CVE-2021-31440)\n* kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory (CVE-2021-31829)\n* kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier (CVE-2021-33200)\n* kernel: reassembling encrypted fragments with non-consecutive packet numbers (CVE-2020-26146)\n* kernel: reassembling mixed encrypted/plaintext fragments (CVE-2020-26147)\n* kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check (CVE-2020-29368)\n* kernel: flowtable list del corruption with kernel BUG (CVE-2021-3635)\n* kernel: NULL pointer dereference in llsec_key_alloc() (CVE-2021-3659)\n* kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure (CVE-2021-20239)\n* kernel: out of bounds array access in drivers/md/dm-ioctl.c (CVE-2021-31916)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2021:4140", "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.5_release_notes/" }, { "category": "external", "summary": "1875275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1875275" }, { "category": "external", "summary": "1902412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1902412" }, { "category": "external", "summary": "1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "1905747", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905747" }, { "category": "external", "summary": "1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_4140.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-15T14:40:17+00:00", "generator": { "date": "2024-11-15T14:40:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2021:4140", "initial_release_date": "2021-11-09T17:26:23+00:00", "revision_history": [ { "date": "2021-11-09T17:26:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2021-11-09T17:26:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T14:40:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::nfv" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product": { "name": "Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::realtime" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-348.rt7.130.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-348.rt7.130.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 8)", "product_id": "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "NFV-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.src as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.src", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 8)", "product_id": "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "relates_to_product_reference": "RT-8.5.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-14615", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2020-01-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1789209" } ], "notes": [ { "category": "description", "text": "An information disclosure flaw was found in the Linux kernel. The i915 graphics driver lacks control of flow for data structures which may allow a local, authenticated user to disclose information when using ioctl commands with an attached i915 device. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Intel graphics card information leak.", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7, and 8 may address this issue.\n\nThis has been rated as having Moderate security impact and is not currently planned to be addressed in future updates of Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-14615" }, { "category": "external", "summary": "RHBZ#1789209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-14615", "url": "https://www.cve.org/CVERecord?id=CVE-2019-14615" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14615" } ], "release_date": "2020-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Preventing loading of the i915 kernel module will prevent attackers from using this exploit against the system; however, the power management functionality of the card will be disabled and the system may draw additional power. See the kcs \u201cHow do I blacklist a kernel module to prevent it from loading automatically?\u201c (https://access.redhat.com/solutions/41278) for instructions on how to disable a kernel module from autoloading. Graphical displays may also be at low resolution or not work correctly.\n\nThis mitigation may not be suitable if the graphical login functionality is required.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Intel graphics card information leak." }, { "cve": "CVE-2020-0427", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-01-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1919893" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux pinctrl system. It is possible to trigger an of bounds read due to a use after free. This could lead to local information disclosure with no additional execution privileges needed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads in pinctrl subsystem.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-0427" }, { "category": "external", "summary": "RHBZ#1919893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0427" } ], "release_date": "2020-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads in pinctrl subsystem." }, { "cve": "CVE-2020-24502", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930379" } ], "notes": [ { "category": "description", "text": "Improper input validation in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24502" }, { "category": "external", "summary": "RHBZ#1930379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24502", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24502" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper input validation in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24503", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930381" } ], "notes": [ { "category": "description", "text": "Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially enable information disclosure via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24503" }, { "category": "external", "summary": "RHBZ#1930381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24503", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24503" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Insufficient access control in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24504", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-02-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1930376" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers for Linux may allow an authenticated user to potentially cause a denial of service via local access.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24504" }, { "category": "external", "summary": "RHBZ#1930376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24504", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24504" }, { "category": "external", "summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00462.html" } ], "release_date": "2021-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Uncontrolled resource consumption in some Intel(R) Ethernet E810 Adapter drivers" }, { "cve": "CVE-2020-24586", "cwe": { "id": "CWE-212", "name": "Improper Removal of Sensitive Information Before Storage or Transfer" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959642" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels implementation of wifi fragmentation handling. An attacker with the ability to transmit within the wireless transmission range of an access point can abuse a flaw where previous contents of wifi fragments can be unintentionally transmitted to another device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Fragmentation cache not cleared on reconnection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24586" }, { "category": "external", "summary": "RHBZ#1959642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959642" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24586", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24586" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24586" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-12T01:20:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Fragmentation cache not cleared on reconnection" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-345", "name": "Insufficient Verification of Data Authenticity" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959654" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s WiFi implementation. An attacker within the wireless range can abuse a logic flaw in the WiFi implementation by reassembling packets from multiple fragments under different keys, treating them as valid. This flaw allows an attacker to send a fragment under an incorrect key, treating them as a valid fragment under the new key. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Reassembling fragments encrypted under different keys", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24587" }, { "category": "external", "summary": "RHBZ#1959654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24587", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24587" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.3f8290e59823.I622a67769ed39257327a362cfc09c812320eb979@changeid/" } ], "release_date": "2021-05-11T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Reassembling fragments encrypted under different keys" }, { "cve": "CVE-2020-24588", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959657" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernels wifi implementation. An attacker within wireless broadcast range can inject custom data into the wireless communication circumventing checks on the data. This can cause the frame to pass checks and be considered a valid frame of a different type.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wifi frame payload being parsed incorrectly as an L2 frame", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-24588" }, { "category": "external", "summary": "RHBZ#1959657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959657" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-24588", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24588" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.25d93176ddaf.I9e265b597f2cd23eb44573f35b625947b386a9de@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wifi frame payload being parsed incorrectly as an L2 frame" }, { "cve": "CVE-2020-26139", "cwe": { "id": "CWE-829", "name": "Inclusion of Functionality from Untrusted Control Sphere" }, "discovery_date": "2021-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959663" } ], "notes": [ { "category": "description", "text": "Frames used for authentication and key management between the AP and connected clients. Some clients may take these redirected frames masquerading as control mechanisms from the AP.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Forwarding EAPOL from unauthenticated wifi client", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26139" }, { "category": "external", "summary": "RHBZ#1959663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959663" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26139", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26139" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26139" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.cb327ed0cabe.Ib7dcffa2a31f0913d660de65ba3c8aca75b1d10f@changeid/" } ], "release_date": "2021-05-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Forwarding EAPOL from unauthenticated wifi client" }, { "cve": "CVE-2020-26140", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960490" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel. Where the WiFi implementations accept plaintext frames in a protected WiFi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext data frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26140" }, { "category": "external", "summary": "RHBZ#1960490", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960490" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26140", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26140" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26140" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext data frames in protected networks" }, { "cve": "CVE-2020-26141", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960492" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel\u0027s WiFi implementation. An attacker within wireless range can inject a control packet fragment where the kernel does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: not verifying TKIP MIC of fragmented frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26141" }, { "category": "external", "summary": "RHBZ#1960492", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960492" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26141", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26141" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26141" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.c3f1d42c6746.I795593fcaae941c471425b8c7d5f7bb185d29142@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: not verifying TKIP MIC of fragmented frames" }, { "cve": "CVE-2020-26143", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960496" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementations assemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting fragmented plaintext frames in protected networks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26143" }, { "category": "external", "summary": "RHBZ#1960496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26143", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26143" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting fragmented plaintext frames in protected networks" }, { "cve": "CVE-2020-26144", "cwe": { "id": "CWE-290", "name": "Authentication Bypass by Spoofing" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960498" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel, where the WiFi implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (ex., LLC/SNAP) header for EAPOL. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26144" }, { "category": "external", "summary": "RHBZ#1960498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26144", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26144" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting unencrypted A-MSDU frames that start with RFC1042 header" }, { "cve": "CVE-2020-26145", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960500" } ], "notes": [ { "category": "description", "text": "A flaw was found in ath10k_htt_rx_proc_rx_frag_ind_hl in drivers/net/wireless/ath/ath10k/htt_rx.c in the Linux kernel WiFi implementations, where it accepts a second (or subsequent) broadcast fragments even when sent in plaintext and then process them as full unfragmented frames. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: accepting plaintext broadcast fragments as full frames", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26145" }, { "category": "external", "summary": "RHBZ#1960500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26145", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26145" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26145" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.9ca6ca7945a9.I1e18b514590af17c155bda86699bc3a971a8dcf4@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: accepting plaintext broadcast fragments as full frames" }, { "cve": "CVE-2020-26146", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Linux kernel, where the WiFi implementation reassemble fragments with non-consecutive packet numbers. An adversary can abuse this to exfiltrate selected fragments. This vulnerability is exploitable when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. Note that WEP is vulnerable to this attack by design.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling encrypted fragments with non-consecutive packet numbers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26146" }, { "category": "external", "summary": "RHBZ#1960502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26146", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26146" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26146" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling encrypted fragments with non-consecutive packet numbers" }, { "cve": "CVE-2020-26147", "cwe": { "id": "CWE-307", "name": "Improper Restriction of Excessive Authentication Attempts" }, "discovery_date": "2021-05-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1960504" } ], "notes": [ { "category": "description", "text": "A flaw was found in ieee80211_rx_h_defragment in net/mac80211/rx.c in the Linux Kernel\u0027s WiFi implementation. This vulnerability can be abused to inject packets or exfiltrate selected fragments when another device sends fragmented frames, and the WEP, CCMP, or GCMP data-confidentiality protocol is used. The highest threat from this vulnerability is to integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: reassembling mixed encrypted/plaintext fragments", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-26147" }, { "category": "external", "summary": "RHBZ#1960504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1960504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-26147", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26147" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26147" }, { "category": "external", "summary": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/", "url": "https://lore.kernel.org/linux-wireless/20210511200110.30c4394bb835.I5acfdb552cc1d20c339c262315950b3eac491397@changeid/" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: reassembling mixed encrypted/plaintext fragments" }, { "cve": "CVE-2020-29368", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2020-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903244" } ], "notes": [ { "category": "description", "text": "An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw has been rated as having Moderateimpact because, based on Red Hat\u0027s assessment, this issue is hard to exploit in practice because the race window is too small for it to be reliable.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29368" }, { "category": "external", "summary": "RHBZ#1903244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29368", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29368" } ], "release_date": "2020-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: the copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1906522" } ], "notes": [ { "category": "description", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel. A local user could use this flaw to read numerical value from memory after free.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Low impact (Red Hat Enterprise Linux 7) because of the need to have CAP_SYS_TTY_CONFIG privileges.\n\nThis flaw is rated as having Moderate (Red Hat Enterprise Linux 8) impact because of the need to have CAP_SYS_TTY_CONFIG privileges. Red Hat Enterprise Linux 8 enabled unprivileged user/network namespaces by default which can be used to exercise this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29660" }, { "category": "external", "summary": "RHBZ#1906522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29660", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660" } ], "release_date": "2020-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: locking inconsistency in drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c can lead to a read-after-free" }, { "cve": "CVE-2020-36158", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1913348" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. The marvell wifi driver could allow a local attacker to execute arbitrary code via a long SSID value in mwifiex_cmd_802_11_ad_hoc_start function. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having Moderate impact because the attacker needs to be local and privileged enough to be able to initiate ad-hoc WIFI network creation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36158" }, { "category": "external", "summary": "RHBZ#1913348", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1913348" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36158", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36158" } ], "release_date": "2020-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mwifiex from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: buffer overflow in mwifiex_cmd_802_11_ad_hoc_start function in drivers/net/wireless/marvell/mwifiex/join.c via a long SSID value" }, { "cve": "CVE-2020-36312", "cwe": { "id": "CWE-772", "name": "Missing Release of Resource after Effective Lifetime" }, "discovery_date": "2021-04-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1947991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the KVM hypervisor of the Linux kernel. A memory leak could occur in kvm_io_bus_unregister_dev() upon a kmalloc failure. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36312" }, { "category": "external", "summary": "RHBZ#1947991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36312", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36312" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36312" } ], "release_date": "2020-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: memory leak upon a kmalloc failure in kvm_io_bus_unregister_dev function in virt/kvm/kvm_main.c" }, { "cve": "CVE-2020-36386", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1969489" } ], "notes": [ { "category": "description", "text": "A flaw out of bounds memory access in the Linux kernel bluetooth subsystem was found in the way when some data being read about the bluetooth device with the hci_extended_inquiry_result_evt call. A local user could use this flaw to crash the system or read some data out of memory bounds that can lead to data confidentiality threat.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because even the data being read out of memory bounds is written to some cache, it was known before that this data from non-safe source and as result no any sensitive dependencies on this data.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36386" }, { "category": "external", "summary": "RHBZ#1969489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1969489" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36386", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36386" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36386" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module bluetooth from being loaded (if Bluetooth not required for the system). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: slab out-of-bounds read in hci_extended_inquiry_result_evt() in net/bluetooth/hci_event.c" }, { "cve": "CVE-2021-0129", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2021-05-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965038" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-0129" }, { "category": "external", "summary": "RHBZ#1965038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965038" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-0129", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0129" } ], "release_date": "2021-06-08T03:30:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Improper access control in BlueZ may allow information disclosure vulnerability." }, { "cve": "CVE-2021-3348", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-01-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1921958" } ], "notes": [ { "category": "description", "text": "A use after free flaw in the Linux kernel network block device (NBD) subsystem was found in the way user calls an ioctl NBD_SET_SOCK at a certain point during device setup.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user (with access to the nbd device).", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3348" }, { "category": "external", "summary": "RHBZ#1921958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1921958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3348" }, { "category": "external", "summary": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/", "url": "https://lore.kernel.org/linux-block/24dff677353e2e30a71d8b66c4dffdbdf77c4dbd.1611595239.git.josef@toxicpanda.com/" } ], "release_date": "2021-01-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module nbd from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Use-after-free in ndb_queue_rq() in drivers/block/nbd.c" }, { "acknowledgments": [ { "names": [ "Ryota Shiga" ] } ], "cve": "CVE-2021-3489", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1959559" } ], "notes": [ { "category": "description", "text": "A flaw out of bound memory write in the Linux kernel BPF subsystem was found in the way user writes to BPF ring buffer too fast, so larger buffer than available memory could be allocated. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Linux kernel eBPF RINGBUF map oversized allocation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3489" }, { "category": "external", "summary": "RHBZ#1959559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1959559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3489", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3489" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/commit/?id=4b81ccebaeee885ab1aa1438133f2991e3a2b6ea" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/11/10", "url": "https://www.openwall.com/lists/oss-security/2021/05/11/10" } ], "release_date": "2021-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Linux kernel eBPF RINGBUF map oversized allocation" }, { "acknowledgments": [ { "names": [ "HaoXiong, LinMa" ], "organization": "ckSec" } ], "cve": "CVE-2021-3564", "cwe": { "id": "CWE-415", "name": "Double Free" }, "discovery_date": "2021-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964139" } ], "notes": [ { "category": "description", "text": "A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: double free in bluetooth subsystem when the HCI device initialization fails", "title": "Vulnerability summary" }, { "category": "other", "text": "The impact is Moderate, because the double free happens during flush procedure, and no use of incorrect data during flush finishing even if double free could happen without kernel crash.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3564" }, { "category": "external", "summary": "RHBZ#1964139", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964139" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3564", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3564" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3564" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/25/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/25/1" } ], "release_date": "2021-05-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: double free in bluetooth subsystem when the HCI device initialization fails" }, { "cve": "CVE-2021-3573", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1966578" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in function hci_sock_bound_ioctl()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges (CAP_NET_ADMIN in initial namespace) required for exploiting the issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3573" }, { "category": "external", "summary": "RHBZ#1966578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1966578" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3573" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/08/2", "url": "https://www.openwall.com/lists/oss-security/2021/06/08/2" } ], "release_date": "2021-06-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising easThe required privileges is CAP_NET_ADMIN capabilities. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.e of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in function hci_sock_bound_ioctl()" }, { "cve": "CVE-2021-3600", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-06-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1981954" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s eBPF verification code, where the eBPF 32-bit div/mod source register truncation could lead to out-of-bounds reads and writes. By default, accessing the eBPF verifier is only possible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can run eBPF instructions to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: eBPF 32-bit source register truncation on div/mod", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3600" }, { "category": "external", "summary": "RHBZ#1981954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3600", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3600" }, { "category": "external", "summary": "https://lore.kernel.org/patchwork/patch/1379497/", "url": "https://lore.kernel.org/patchwork/patch/1379497/" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/06/23/1", "url": "https://www.openwall.com/lists/oss-security/2021/06/23/1" } ], "release_date": "2021-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: eBPF 32-bit source register truncation on div/mod" }, { "cve": "CVE-2021-3635", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-06-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1976946" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel netfilter implementation. A user with root (CAP_SYS_ADMIN) access is able to panic the system when issuing netfilter netflow commands", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3635" }, { "category": "external", "summary": "RHBZ#1976946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1976946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3635", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3635" } ], "release_date": "2021-08-06T04:47:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: flowtable list del corruption with kernel BUG at lib/list_debug.c:50" }, { "cve": "CVE-2021-3659", "cwe": { "id": "CWE-252", "name": "Unchecked Return Value" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1975949" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3659" }, { "category": "external", "summary": "RHBZ#1975949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3659", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3659" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3659" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1165affd484889d4986cf3b724318935a0b120d8" } ], "release_date": "2021-04-06T19:22:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module mac802154 from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c" }, { "acknowledgments": [ { "names": [ "Haoran Luo" ], "organization": "Chaitin Tech" } ], "cve": "CVE-2021-3679", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2021-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1989165" } ], "notes": [ { "category": "description", "text": "A lack of CPU resources in the Linux kernel tracing module functionality was found in the way users use the trace ring buffer in specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: DoS in rb_per_cpu_empty()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3679" }, { "category": "external", "summary": "RHBZ#1989165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989165" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3679", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3679" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3679" }, { "category": "external", "summary": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/", "url": "https://lore.kernel.org/lkml/20210723125527.767d1c18@oasis.local.home/" } ], "release_date": "2021-07-20T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: DoS in rb_per_cpu_empty()" }, { "acknowledgments": [ { "names": [ "Miklos Szeredi" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2021-3732", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1995249" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-3732" }, { "category": "external", "summary": "RHBZ#1995249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3732" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=427215d85e8d" } ], "release_date": "2021-08-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: Mounting overlayfs inside an unprivileged user namespace can reveal files" }, { "acknowledgments": [ { "names": [ "Loris Reiff" ] } ], "cve": "CVE-2021-20194", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2020-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1912683" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel BPF subsystem was found in the way user running BPF script calling getsockopt. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as having Moderate impact because of the need to have elevated privileges or non-standard configuration for running BPF script.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20194" }, { "category": "external", "summary": "RHBZ#1912683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20194", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20194" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20194" } ], "release_date": "2021-01-22T10:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: heap overflow in __cgroup_bpf_run_filter_getsockopt()" }, { "cve": "CVE-2021-20239", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1923636" } ], "notes": [ { "category": "description", "text": "A flaw was found in the BPF protocol. This flaw allows an attacker with a local account to leak information about kernel internal addresses. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-20239" }, { "category": "external", "summary": "RHBZ#1923636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923636" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-20239", "url": "https://www.cve.org/CVERecord?id=CVE-2021-20239" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20239" } ], "release_date": "2021-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Loading a filter is a privileged (CAP_SYS_ADMIN or root) operation. Once any filter is used, this attack is capable of being used by an unprivileged user. There is no known mitigation that product security finds suitable for this flaw.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: setsockopt System Call Untrusted Pointer Dereference Information Disclosure" }, { "acknowledgments": [ { "names": [ "Or Cohen" ], "organization": "Palo Alto Networks" } ], "cve": "CVE-2021-23133", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2021-04-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1948772" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the Linux kernel\u0027s SCTP socket functionality that triggers a race condition. This flaw allows a local user to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sctp_destroy_sock list_del", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is rated as having a Moderate impact because of the privileges required for running the known reproducer. The required privileges are CAP_BPF and CAP_NET_ADMIN capabilities that are disabled by default in Red Hat Enterprise Linux 7. For Red Hat Enterprise Linux 8, the SCTP protocol itself is disabled by default and cannot be used by a user without enablement by an administrator.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-23133" }, { "category": "external", "summary": "RHBZ#1948772", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948772" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-23133", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23133" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b166a20b07382b8bc1dcee2a448715c9c2c81b5b" } ], "release_date": "2021-04-18T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "To mitigate this issue, prevent the module sctp from being loaded (and this is so by default for Red Hat Enterprise Linux 8). Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sctp_destroy_sock list_del" }, { "cve": "CVE-2021-28950", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941762" } ], "notes": [ { "category": "description", "text": "A denial of service in the kernel side of the FUSE functionality can allow a local system to create a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28950" }, { "category": "external", "summary": "RHBZ#1941762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28950", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28950" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "As the FUSE module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\n\n# echo \"install fuse /bin/true\" \u003e\u003e /etc/modprobe.d/disable-fuse.conf\n\nThe system will need to be restarted if the FUSE modules are loaded. In most circumstances, the CIFS kernel modules will be unable to be unloaded while the FUSE filesystems are in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fuse: stall on CPU can occur because a retry loop continually finds the same bad inode" }, { "cve": "CVE-2021-28971", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2021-03-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1941784" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel. On some Haswell CPUs, userspace applications (such as perf-fuzzer) can cause a system crash because the PEBS status in a PEBS record is mishandled.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-28971" }, { "category": "external", "summary": "RHBZ#1941784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941784" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-28971", "url": "https://www.cve.org/CVERecord?id=CVE-2021-28971" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28971" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: System crash in intel_pmu_drain_pebs_nhm in arch/x86/events/intel/ds.c" }, { "cve": "CVE-2021-29155", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-04-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1951595" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). In this flaw a local, special user privileged (CAP_SYS_ADMIN) BPF program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory. This can be abused to extract contents of kernel memory via side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29155" }, { "category": "external", "summary": "RHBZ#1951595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951595" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29155", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29155" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29155" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/04/18/4", "url": "https://www.openwall.com/lists/oss-security/2021/04/18/4" } ], "release_date": "2021-04-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection for sequences of pointer arithmetic operations against speculatively out-of-bounds loads can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-29646", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945345" } ], "notes": [ { "category": "description", "text": "A flaw buffer overflow in the Linux kernel TIPC protocol functionality was found in the way user uses protocol with encryption enabled. A local user could use this flaw to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29646" }, { "category": "external", "summary": "RHBZ#1945345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945345" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29646", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29646" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29646" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: improper input validation in tipc_nl_retrieve_key function in net/tipc/node.c" }, { "cve": "CVE-2021-29650", "cwe": { "id": "CWE-662", "name": "Improper Synchronization" }, "discovery_date": "2021-03-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1945388" } ], "notes": [ { "category": "description", "text": "A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-29650" }, { "category": "external", "summary": "RHBZ#1945388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1945388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-29650", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29650" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29650" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=175e476b8cdf2a4de7432583b49c871345e4f8a1" } ], "release_date": "2021-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS" }, { "acknowledgments": [ { "names": [ "Manfred Paul" ], "organization": "RedRocket CTF team" } ], "cve": "CVE-2021-31440", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2021-05-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1964028" } ], "notes": [ { "category": "description", "text": "An out-of-bounds access flaw was found in the Linux kernel\u2019s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs.. By default accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. The issue results from the lack of proper validation of user-supplied eBPF programs prior to executing them. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local escalation of privileges in handling of eBPF programs", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31440" }, { "category": "external", "summary": "RHBZ#1964028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31440", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31440" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31440" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=10bf4e83167cc68595b85fd73bb91e8f2c086e36" }, { "category": "external", "summary": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier", "url": "https://www.zerodayinitiative.com/blog/2021/5/26/cve-2021-31440-an-incorrect-bounds-calculation-in-the-linux-kernel-ebpf-verifier" } ], "release_date": "2021-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: local escalation of privileges in handling of eBPF programs" }, { "cve": "CVE-2021-31829", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-05-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1957788" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s eBPF verification code. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. This flaw allows a local user who can insert eBPF instructions, to use the eBPF verifier to abuse a spectre-like flaw and infer all system memory. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31829" }, { "category": "external", "summary": "RHBZ#1957788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31829", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31829" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31829" } ], "release_date": "2021-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 and 8 kernel to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: protection of stack pointer against speculative pointer arithmetic can be bypassed to leak content of kernel memory" }, { "cve": "CVE-2021-31916", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1946965" } ], "notes": [ { "category": "description", "text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash, a leak of internal kernel information, or a privilege escalation problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds array access in drivers/md/dm-ioctl.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated a Low impact because in the default configuration, the issue can only be triggered by a privileged local user.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-31916" }, { "category": "external", "summary": "RHBZ#1946965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946965" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-31916", "url": "https://www.cve.org/CVERecord?id=CVE-2021-31916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31916" }, { "category": "external", "summary": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a", "url": "https://github.com/torvalds/linux/commit/4edbe1d7bcffcd6269f3b5eb63f710393ff2ec7a" }, { "category": "external", "summary": "https://seclists.org/oss-sec/2021/q1/268", "url": "https://seclists.org/oss-sec/2021/q1/268" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: out of bounds array access in drivers/md/dm-ioctl.c" }, { "cve": "CVE-2021-33033", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-05-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1961300" } ], "notes": [ { "category": "description", "text": "A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c", "title": "Vulnerability summary" }, { "category": "other", "text": "Considered to be Moderate rate, because by default CIPSO non-enabled and both no known way to reproduce the attack remotely and both it looks complex if even possible to use the attack in any way apart from crashing the system. For the usage of the inbound CIPSO connections, the administrator have to enable it with netlabelctl utility first. The vulnerability is considered to be for local user, because it can happen only when a local user opens a socket for sending packets, but not during receiving packets.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33033" }, { "category": "external", "summary": "RHBZ#1961300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1961300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33033", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33033" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33033" } ], "release_date": "2021-03-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The mitigation would be not allowing CIPSO labeling for the inbound network connections. For the most of the default configurations both for network routers and for the Linux servers itself it is disabled by default.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c" }, { "cve": "CVE-2021-33200", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1965458" } ], "notes": [ { "category": "description", "text": "A flaw was found in kernel/bpf/verifier.c in BPF in the Linux kernel. An incorrect limit is enforced for pointer arithmetic operations which can be abused to perform out-of-bounds reads and writes in kernel memory, leading to local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-33200" }, { "category": "external", "summary": "RHBZ#1965458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1965458" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-33200", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33200" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33200" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=bb01a1bba579b4b1c5566af24d95f1767859771e" }, { "category": "external", "summary": "https://www.openwall.com/lists/oss-security/2021/05/27/1", "url": "https://www.openwall.com/lists/oss-security/2021/05/27/1" } ], "release_date": "2021-05-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out-of-bounds reads and writes due to enforcing incorrect limits for pointer arithmetic operations by BPF verifier" }, { "cve": "CVE-2021-46905", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2024-02-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2266253" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel. This flaw occurs due to an unconditional NULL-pointer dereference on every disconnect in the Linux kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL-deref on disconnect regression", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-46905" }, { "category": "external", "summary": "RHBZ#2266253", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266253" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-46905", "url": "https://www.cve.org/CVERecord?id=CVE-2021-46905" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46905" }, { "category": "external", "summary": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T", "url": "https://lore.kernel.org/linux-cve-announce/2024022557-CVE-2021-46905-6507@gregkh/T" } ], "release_date": "2024-02-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: NULL-deref on disconnect regression" }, { "cve": "CVE-2022-20166", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2122089" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s sysfs layer. This flaw allows a local user who can read files under the /sysfs mount point to corrupt memory or possibly crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible buffer overflow in sysfs reading", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-20166" }, { "category": "external", "summary": "RHBZ#2122089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-20166", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20166" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-20166" } ], "release_date": "2022-08-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2021-11-09T17:26:23+00:00", "details": "For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.5 Release Notes linked from the References section.\n\nFor details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2021:4140" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "NFV-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "NFV-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.src", "RT-8.5.0.GA:kernel-rt-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-core-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-devel-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-kvm-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-0:4.18.0-348.rt7.130.el8.x86_64", "RT-8.5.0.GA:kernel-rt-modules-extra-0:4.18.0-348.rt7.130.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible buffer overflow in sysfs reading" } ] }
SSA-770721
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC RF160B contain multiple vulnerabilities of different types that could allow an attacker to execute arbitrary code within the context of a privileged process.\n\nSiemens has released a new version for SIMATIC RF160B and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770721.json" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770721.pdf" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-770721.txt" } ], "title": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2", "tracking": { "current_release_date": "2024-03-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-770721", "initial_release_date": "2024-03-12T00:00:00Z", "revision_history": [ { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2", "product": { "name": "SIMATIC RF160B (6GT2003-0FA00)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GT2003-0FA00" ] } } } ], "category": "product_name", "name": "SIMATIC RF160B (6GT2003-0FA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14491", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-18509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-18509" }, { "cve": "CVE-2020-0338", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-123700107", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-0338" }, { "cve": "CVE-2020-0417", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-154319182", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-0417" }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-11301", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-11301" }, { "cve": "CVE-2020-14305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u2019s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-14305" }, { "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-15436", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-25705", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26555", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-26555" }, { "cve": "CVE-2020-26558", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-26558" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2021-0302", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0302" }, { "cve": "CVE-2021-0305", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0305" }, { "cve": "CVE-2021-0325", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0325" }, { "cve": "CVE-2021-0326", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0326" }, { "cve": "CVE-2021-0327", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0327" }, { "cve": "CVE-2021-0328", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0328" }, { "cve": "CVE-2021-0329", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0329" }, { "cve": "CVE-2021-0330", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0330" }, { "cve": "CVE-2021-0331", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0331" }, { "cve": "CVE-2021-0333", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0333" }, { "cve": "CVE-2021-0334", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0334" }, { "cve": "CVE-2021-0336", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0336" }, { "cve": "CVE-2021-0337", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0337" }, { "cve": "CVE-2021-0339", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0339" }, { "cve": "CVE-2021-0341", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0341" }, { "cve": "CVE-2021-0390", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0390" }, { "cve": "CVE-2021-0391", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0391" }, { "cve": "CVE-2021-0392", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0392" }, { "cve": "CVE-2021-0393", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0393" }, { "cve": "CVE-2021-0394", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0394" }, { "cve": "CVE-2021-0396", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0396" }, { "cve": "CVE-2021-0397", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0397" }, { "cve": "CVE-2021-0399", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0399" }, { "cve": "CVE-2021-0400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-177561690", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0400" }, { "cve": "CVE-2021-0429", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175074139", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0429" }, { "cve": "CVE-2021-0431", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174149901", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0431" }, { "cve": "CVE-2021-0433", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0433" }, { "cve": "CVE-2021-0434", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible phishing attack allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-167403112", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0434" }, { "cve": "CVE-2021-0435", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174150451", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0435" }, { "cve": "CVE-2021-0436", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0436" }, { "cve": "CVE-2021-0437", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176168330", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0437" }, { "cve": "CVE-2021-0438", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-152064592", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0438" }, { "cve": "CVE-2021-0443", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-170474245", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0443" }, { "cve": "CVE-2021-0444", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-178825358", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0444" }, { "cve": "CVE-2021-0471", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444786", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0471" }, { "cve": "CVE-2021-0473", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179687208", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0473" }, { "cve": "CVE-2021-0474", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0474" }, { "cve": "CVE-2021-0476", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-169252501", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0476" }, { "cve": "CVE-2021-0478", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0478" }, { "cve": "CVE-2021-0480", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-174493336", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0480" }, { "cve": "CVE-2021-0481", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-172939189", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0481" }, { "cve": "CVE-2021-0484", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-173720767", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0484" }, { "cve": "CVE-2021-0506", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0506" }, { "cve": "CVE-2021-0507", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181860042", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0507" }, { "cve": "CVE-2021-0508", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0508" }, { "cve": "CVE-2021-0509", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0509" }, { "cve": "CVE-2021-0510", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0510" }, { "cve": "CVE-2021-0511", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0511" }, { "cve": "CVE-2021-0512", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0513", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-156090809", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0513" }, { "cve": "CVE-2021-0514", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9 Android-11 Android-8.1Android ID: A-162604069", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0514" }, { "cve": "CVE-2021-0515", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-167389063", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0515" }, { "cve": "CVE-2021-0516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0516" }, { "cve": "CVE-2021-0519", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0519" }, { "cve": "CVE-2021-0520", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-176237595", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0520" }, { "cve": "CVE-2021-0521", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174661955", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0521" }, { "cve": "CVE-2021-0522", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0522" }, { "cve": "CVE-2021-0584", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In verifyBufferObject of Parcel.cpp, there is a possible out of bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-179289794", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0584" }, { "cve": "CVE-2021-0585", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-184963385", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0585" }, { "cve": "CVE-2021-0586", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-182584940", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0586" }, { "cve": "CVE-2021-0587", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185259758", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0587" }, { "cve": "CVE-2021-0588", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-177238342", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0588" }, { "cve": "CVE-2021-0589", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0589" }, { "cve": "CVE-2021-0591", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0591" }, { "cve": "CVE-2021-0593", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179386068", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0593" }, { "cve": "CVE-2021-0594", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0594" }, { "cve": "CVE-2021-0596", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181346550", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0596" }, { "cve": "CVE-2021-0597", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496502", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0597" }, { "cve": "CVE-2021-0598", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0598" }, { "cve": "CVE-2021-0599", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175614289", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0599" }, { "cve": "CVE-2021-0600", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-179042963", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0600" }, { "cve": "CVE-2021-0601", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0601" }, { "cve": "CVE-2021-0604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179910660", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0604" }, { "cve": "CVE-2021-0640", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0640" }, { "cve": "CVE-2021-0641", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0641" }, { "cve": "CVE-2021-0642", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0642" }, { "cve": "CVE-2021-0646", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0646" }, { "cve": "CVE-2021-0650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-190286685", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0650" }, { "cve": "CVE-2021-0651", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0651" }, { "cve": "CVE-2021-0652", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0652" }, { "cve": "CVE-2021-0653", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-177931370", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0653" }, { "cve": "CVE-2021-0682", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0682" }, { "cve": "CVE-2021-0683", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0683" }, { "cve": "CVE-2021-0684", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0684" }, { "cve": "CVE-2021-0687", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0687" }, { "cve": "CVE-2021-0688", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0688" }, { "cve": "CVE-2021-0689", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0689" }, { "cve": "CVE-2021-0690", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0690" }, { "cve": "CVE-2021-0692", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0692" }, { "cve": "CVE-2021-0695", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0695" }, { "cve": "CVE-2021-0704", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-179338675", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0704" }, { "cve": "CVE-2021-0706", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-193444889", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0706" }, { "cve": "CVE-2021-0708", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In runDumpHeap of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-183262161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0708" }, { "cve": "CVE-2021-0870", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0870" }, { "cve": "CVE-2021-0919", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-197336441", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0919" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2021-0926", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-191053931", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0926" }, { "cve": "CVE-2021-0928", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0928" }, { "cve": "CVE-2021-0929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0929" }, { "cve": "CVE-2021-0930", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-181660091", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0930" }, { "cve": "CVE-2021-0931", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-180747689", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0931" }, { "cve": "CVE-2021-0933", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-172251622", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0933" }, { "cve": "CVE-2021-0952", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-195748381", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0952" }, { "cve": "CVE-2021-0953", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0953" }, { "cve": "CVE-2021-0961", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0961" }, { "cve": "CVE-2021-0963", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0963" }, { "cve": "CVE-2021-0964", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-193363621", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0964" }, { "cve": "CVE-2021-0965", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194300867", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0965" }, { "cve": "CVE-2021-0967", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In vorbis_book_decodev_set of codebook.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199065614", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0967" }, { "cve": "CVE-2021-0968", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0968" }, { "cve": "CVE-2021-0970", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0970" }, { "cve": "CVE-2021-1972", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-1972" }, { "cve": "CVE-2021-1976", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-1976" }, { "cve": "CVE-2021-29647", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-29647" }, { "cve": "CVE-2021-33909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-38204", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-38204" }, { "cve": "CVE-2021-39621", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39621" }, { "cve": "CVE-2021-39623", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39623" }, { "cve": "CVE-2021-39626", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39626" }, { "cve": "CVE-2021-39627", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39627" }, { "cve": "CVE-2021-39629", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197353344", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39629" }, { "cve": "CVE-2021-39633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150694665References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39633" }, { "cve": "CVE-2021-39634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39634" }, { "cve": "CVE-2022-20127", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221862119", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20127" }, { "cve": "CVE-2022-20130", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20130" }, { "cve": "CVE-2022-20227", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20227" }, { "cve": "CVE-2022-20229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20229" }, { "cve": "CVE-2022-20355", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219498290", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20355" }, { "cve": "CVE-2022-20411", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20411" }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20421" }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20422" }, { "cve": "CVE-2022-20423", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20423" }, { "cve": "CVE-2022-20462", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20462" }, { "cve": "CVE-2022-20466", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "notes": [ { "category": "summary", "text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-179725730", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20466" }, { "cve": "CVE-2022-20468", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-228450451", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20468" }, { "cve": "CVE-2022-20469", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230867224", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20469" }, { "cve": "CVE-2022-20472", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239210579", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20472" }, { "cve": "CVE-2022-20473", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20473" }, { "cve": "CVE-2022-20476", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-240936919", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20476" }, { "cve": "CVE-2022-20483", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20483" }, { "cve": "CVE-2022-20498", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246465319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20498" }, { "cve": "CVE-2022-20500", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246540168", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20500" } ] }
ssa-770721
Vulnerability from csaf_siemens
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited. (TLPv2: TLP:CLEAR)", "tlp": { "label": "WHITE" } }, "lang": "en", "notes": [ { "category": "summary", "text": "SIMATIC RF160B contain multiple vulnerabilities of different types that could allow an attacker to execute arbitrary code within the context of a privileged process.\n\nSiemens has released a new version for SIMATIC RF160B and recommends to update to the latest version.", "title": "Summary" }, { "category": "general", "text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: \nhttps://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity", "title": "General Recommendations" }, { "category": "general", "text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories", "title": "Additional Resources" }, { "category": "legal_disclaimer", "text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "productcert@siemens.com", "name": "Siemens ProductCERT", "namespace": "https://www.siemens.com" }, "references": [ { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - HTML Version", "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - CSAF Version", "url": "https://cert-portal.siemens.com/productcert/csaf/ssa-770721.json" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - PDF Version", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-770721.pdf" }, { "category": "self", "summary": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 - TXT Version", "url": "https://cert-portal.siemens.com/productcert/txt/ssa-770721.txt" } ], "title": "SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2", "tracking": { "current_release_date": "2024-03-12T00:00:00Z", "generator": { "engine": { "name": "Siemens ProductCERT CSAF Generator", "version": "1" } }, "id": "SSA-770721", "initial_release_date": "2024-03-12T00:00:00Z", "revision_history": [ { "date": "2024-03-12T00:00:00Z", "legacy_version": "1.0", "number": "1", "summary": "Publication Date" } ], "status": "interim", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2", "product": { "name": "SIMATIC RF160B (6GT2003-0FA00)", "product_id": "1", "product_identification_helper": { "model_numbers": [ "6GT2003-0FA00" ] } } } ], "category": "product_name", "name": "SIMATIC RF160B (6GT2003-0FA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14491", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-14491" }, { "cve": "CVE-2017-18509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2017-18509" }, { "cve": "CVE-2020-0338", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-9Android ID: A-123700107", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-0338" }, { "cve": "CVE-2020-0417", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-154319182", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-0417" }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-10768" }, { "cve": "CVE-2020-11301", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-11301" }, { "cve": "CVE-2020-14305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u2019s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-14305" }, { "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u2019s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-14381" }, { "cve": "CVE-2020-15436", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-15436" }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:U/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-24587" }, { "cve": "CVE-2020-25705", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-25705" }, { "cve": "CVE-2020-26555", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-26555" }, { "cve": "CVE-2020-26558", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-26558" }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29660" }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2020-29661" }, { "cve": "CVE-2021-0302", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-155287782", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0302" }, { "cve": "CVE-2021-0305", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-154015447", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0305" }, { "cve": "CVE-2021-0325", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-174238784", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0325" }, { "cve": "CVE-2021-0326", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In p2p_copy_client_info of p2p.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi Direct search, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172937525", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0326" }, { "cve": "CVE-2021-0327", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-172935267", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0327" }, { "cve": "CVE-2021-0328", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-172670415", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0328" }, { "cve": "CVE-2021-0329", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In several native functions called by AdvertiseManager.java, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-171400004", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0329" }, { "cve": "CVE-2021-0330", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-170732441", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0330" }, { "cve": "CVE-2021-0331", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-170731783", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0331" }, { "cve": "CVE-2021-0333", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-168504491", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0333" }, { "cve": "CVE-2021-0334", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0334" }, { "cve": "CVE-2021-0336", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-158219161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0336" }, { "cve": "CVE-2021-0337", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-157474195", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0337" }, { "cve": "CVE-2021-0339", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-8.1 Android-9Android ID: A-145728687", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0339" }, { "cve": "CVE-2021-0341", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171980069", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0341" }, { "cve": "CVE-2021-0390", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174749461", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0390" }, { "cve": "CVE-2021-0391", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172841550", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0391" }, { "cve": "CVE-2021-0392", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-175124730", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0392" }, { "cve": "CVE-2021-0393", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-168041375", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0393" }, { "cve": "CVE-2021-0394", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-172655291", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0394" }, { "cve": "CVE-2021-0396", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0396" }, { "cve": "CVE-2021-0397", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174052148", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0397" }, { "cve": "CVE-2021-0399", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-176919394References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0399" }, { "cve": "CVE-2021-0400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-177561690", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0400" }, { "cve": "CVE-2021-0429", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175074139", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0429" }, { "cve": "CVE-2021-0431", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174149901", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0431" }, { "cve": "CVE-2021-0433", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-171221090", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0433" }, { "cve": "CVE-2021-0434", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible phishing attack allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-167403112", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0434" }, { "cve": "CVE-2021-0435", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174150451", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0435" }, { "cve": "CVE-2021-0436", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out of bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496160", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0436" }, { "cve": "CVE-2021-0437", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176168330", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0437" }, { "cve": "CVE-2021-0438", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10Android ID: A-152064592", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0438" }, { "cve": "CVE-2021-0443", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-170474245", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0443" }, { "cve": "CVE-2021-0444", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-178825358", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0444" }, { "cve": "CVE-2021-0471", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444786", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0471" }, { "cve": "CVE-2021-0473", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179687208", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0473" }, { "cve": "CVE-2021-0474", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-177611958", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0474" }, { "cve": "CVE-2021-0476", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-169252501", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0476" }, { "cve": "CVE-2021-0478", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-169255797", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0478" }, { "cve": "CVE-2021-0480", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-174493336", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0480" }, { "cve": "CVE-2021-0481", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-172939189", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0481" }, { "cve": "CVE-2021-0484", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-173720767", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0484" }, { "cve": "CVE-2021-0506", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-181962311", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0506" }, { "cve": "CVE-2021-0507", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181860042", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0507" }, { "cve": "CVE-2021-0508", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0508" }, { "cve": "CVE-2021-0509", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0509" }, { "cve": "CVE-2021-0510", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444622", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0510" }, { "cve": "CVE-2021-0511", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11Android ID: A-178055795", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0511" }, { "cve": "CVE-2021-0512", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-173843328References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0512" }, { "cve": "CVE-2021-0513", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-156090809", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0513" }, { "cve": "CVE-2021-0514", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-9 Android-11 Android-8.1Android ID: A-162604069", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0514" }, { "cve": "CVE-2021-0515", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-167389063", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0515" }, { "cve": "CVE-2021-0516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out of bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181660448", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0516" }, { "cve": "CVE-2021-0519", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-176533109", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0519" }, { "cve": "CVE-2021-0520", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-176237595", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0520" }, { "cve": "CVE-2021-0521", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-174661955", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0521" }, { "cve": "CVE-2021-0522", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-174182139", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0522" }, { "cve": "CVE-2021-0584", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In verifyBufferObject of Parcel.cpp, there is a possible out of bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-179289794", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0584" }, { "cve": "CVE-2021-0585", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-184963385", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0585" }, { "cve": "CVE-2021-0586", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-182584940", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0586" }, { "cve": "CVE-2021-0587", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185259758", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0587" }, { "cve": "CVE-2021-0588", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9Android ID: A-177238342", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0588" }, { "cve": "CVE-2021-0589", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180939982", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0589" }, { "cve": "CVE-2021-0591", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179386960", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0591" }, { "cve": "CVE-2021-0593", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179386068", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0593" }, { "cve": "CVE-2021-0594", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-176445224", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0594" }, { "cve": "CVE-2021-0596", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-181346550", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0596" }, { "cve": "CVE-2021-0597", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176496502", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0597" }, { "cve": "CVE-2021-0598", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-180422108", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0598" }, { "cve": "CVE-2021-0599", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-175614289", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0599" }, { "cve": "CVE-2021-0600", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-179042963", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0600" }, { "cve": "CVE-2021-0601", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out of bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-180643802", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0601" }, { "cve": "CVE-2021-0604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-179910660", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0604" }, { "cve": "CVE-2021-0640", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-187957589", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0640" }, { "cve": "CVE-2021-0641", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185235454", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0641" }, { "cve": "CVE-2021-0642", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-185126149", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0642" }, { "cve": "CVE-2021-0646", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-153352319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0646" }, { "cve": "CVE-2021-0650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-190286685", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0650" }, { "cve": "CVE-2021-0651", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In loadLabel of PackageItemInfo.java, there is a possible way to DoS a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-67013844", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0651" }, { "cve": "CVE-2021-0652", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing of not thread-safe objects. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-185178568", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0652" }, { "cve": "CVE-2021-0653", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-177931370", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0653" }, { "cve": "CVE-2021-0682", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-159624555", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0682" }, { "cve": "CVE-2021-0683", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In runTraceIpcStop of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-8.1 Android-9 Android-10Android ID: A-185398942", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0683" }, { "cve": "CVE-2021-0684", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out of bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-179839665", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0684" }, { "cve": "CVE-2021-0687", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-188913943", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0687" }, { "cve": "CVE-2021-0688", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-161149543", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0688" }, { "cve": "CVE-2021-0689", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-8.1 Android-9Android ID: A-190188264", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0689" }, { "cve": "CVE-2021-0690", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-182152757", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0690" }, { "cve": "CVE-2021-0692", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-9 Android-10Android ID: A-179289753", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0692" }, { "cve": "CVE-2021-0695", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In get_sock_stat of xt_qtaguid.c, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-184018316References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0695" }, { "cve": "CVE-2021-0704", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-179338675", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0704" }, { "cve": "CVE-2021-0706", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11Android ID: A-193444889", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0706" }, { "cve": "CVE-2021-0708", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In runDumpHeap of ActivityManagerShellCommand.java, there is a possible deletion of system files due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-183262161", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0708" }, { "cve": "CVE-2021-0870", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In RW_SetActivatedTagType of rw_main.cc, there is possible memory corruption due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-192472262", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0870" }, { "cve": "CVE-2021-0919", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-197336441", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0919" }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196926917References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0920" }, { "cve": "CVE-2021-0926", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-191053931", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0926" }, { "cve": "CVE-2021-0928", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-9Android ID: A-188675581", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0928" }, { "cve": "CVE-2021-0929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-187527909References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0929" }, { "cve": "CVE-2021-0930", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-181660091", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0930" }, { "cve": "CVE-2021-0931", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-180747689", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0931" }, { "cve": "CVE-2021-0933", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-172251622", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0933" }, { "cve": "CVE-2021-0952", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-195748381", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0952" }, { "cve": "CVE-2021-0953", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-184046278", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0953" }, { "cve": "CVE-2021-0961", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-196046570References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0961" }, { "cve": "CVE-2021-0963", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199754277", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0963" }, { "cve": "CVE-2021-0964", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-193363621", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0964" }, { "cve": "CVE-2021-0965", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194300867", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0965" }, { "cve": "CVE-2021-0967", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In vorbis_book_decodev_set of codebook.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-199065614", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0967" }, { "cve": "CVE-2021-0968", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197868577", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0968" }, { "cve": "CVE-2021-0970", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-196970023", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-0970" }, { "cve": "CVE-2021-1972", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-1972" }, { "cve": "CVE-2021-1976", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-1976" }, { "cve": "CVE-2021-29647", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-29647" }, { "cve": "CVE-2021-33909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-33909" }, { "cve": "CVE-2021-38204", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-38204" }, { "cve": "CVE-2021-39621", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39621" }, { "cve": "CVE-2021-39623", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In doRead of SimpleDecodingSource.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194105348", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39623" }, { "cve": "CVE-2021-39626", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-194695497", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39626" }, { "cve": "CVE-2021-39627", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-185126549", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39627" }, { "cve": "CVE-2021-39629", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-9Android ID: A-197353344", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39629" }, { "cve": "CVE-2021-39633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-150694665References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39633" }, { "cve": "CVE-2021-39634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204450605References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2021-39634" }, { "cve": "CVE-2022-20127", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out of bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-221862119", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20127" }, { "cve": "CVE-2022-20130", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224314979", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20130" }, { "cve": "CVE-2022-20227", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20227" }, { "cve": "CVE-2022-20229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20229" }, { "cve": "CVE-2022-20355", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-219498290", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20355" }, { "cve": "CVE-2022-20411", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-232023771", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20411" }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239630375References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20421" }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-237540956References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20422" }, { "cve": "CVE-2022-20423", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In rndis_set_response of rndis.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239842288References: Upstream kernel", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20423" }, { "cve": "CVE-2022-20462", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230356196", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20462" }, { "cve": "CVE-2022-20466", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "notes": [ { "category": "summary", "text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-179725730", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20466" }, { "cve": "CVE-2022-20468", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-228450451", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20468" }, { "cve": "CVE-2022-20469", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-230867224", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20469" }, { "cve": "CVE-2022-20472", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239210579", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20472" }, { "cve": "CVE-2022-20473", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-239267173", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20473" }, { "cve": "CVE-2022-20476", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-240936919", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20476" }, { "cve": "CVE-2022-20483", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out of bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-242459126", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20483" }, { "cve": "CVE-2022-20498", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246465319", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20498" }, { "cve": "CVE-2022-20500", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12L Android-13Android ID: A-246540168", "title": "Summary" } ], "product_status": { "known_affected": [ "1" ] }, "remediations": [ { "category": "vendor_fix", "details": "Update to V2.2 or later version", "product_ids": [ "1" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "products": [ "1" ] } ], "title": "CVE-2022-20500" } ] }
ICSA-24-074-07
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of a privileged process.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-24-074-07 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-074-07.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-24-074-07 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC", "tracking": { "current_release_date": "2024-03-14T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-074-07", "initial_release_date": "2024-03-14T06:00:00.000000Z", "revision_history": [ { "date": "2024-03-14T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2", "product": { "name": "Siemens SIMATIC RF160B (6GT2003-0FA00): \u003cV2.2", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC RF160B (6GT2003-0FA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14491", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14491" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2017-18509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18509" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-0338", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-9 Android ID: A-123700107", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0338" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-0417", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-154319182", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0417" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-11301", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11301" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-14305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u0027s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-15436", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15436" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-25705", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26555", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26558", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26558" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0302", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1 Android-9 Android-10Android ID: A-155287782", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0302" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0305", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-154015447", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0325", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-174238784", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0325" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0326", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In p2p_copy_client_info of p2p.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi direct search, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172937525", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0326" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0327", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-172935267", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0327" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0328", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172670415", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0328" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0329", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In several native functions called by AdvertiseManager.java, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-171400004", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0329" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0330", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-170732441", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0330" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0331", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-170731783", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0331" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0333", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-168504491", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0333" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0334", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-163358811", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0334" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0336", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-158219161", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0336" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0337", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-157474195", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0337" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0339", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-145728687", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0339" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0341", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171980069", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0341" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0390", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174749461", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0390" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0391", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172841550", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0391" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0392", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-175124730", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0392" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0393", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-168041375", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0393" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0394", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172655291", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0394" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0396", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-160610106", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0396" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0397", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174052148", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0397" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0399", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-176919394References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0399" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-177561690", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0400" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0429", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175074139", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0429" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0431", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174149901", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0431" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0433", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171221090", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0433" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0434", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, a phishing attack is possible allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-167403112", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0434" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0435", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174150451", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0435" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0436", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out-of-bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496160", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0436" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0437", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176168330", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0437" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0438", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-152064592", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0438" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0443", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-170474245", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0443" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0444", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-178825358", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0444" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0471", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444786", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0471" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0473", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179687208", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0474", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-177611958", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0474" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0476", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-169252501", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0476" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0478", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-169255797", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0478" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0480", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-174493336", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0480" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0481", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-172939189", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0481" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0484", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-173720767", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0484" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0506", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-181962311", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0506" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0507", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181860042", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0507" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0508", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176444154", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0508" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0509", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444161", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0509" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0510", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444622", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0510" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0511", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-178055795", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0511" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0512", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-173843328References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0512" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0513", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-156090809", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0513" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0514", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-9, Android-11, Android-8.1 Android ID: A-162604069", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0514" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0515", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-167389063", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0515" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out-of-bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181660448", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0516" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0519", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-176533109", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0519" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0520", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-10 Android ID: A-176237595", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0520" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0521", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174661955", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0521" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0522", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out-of-bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-174182139", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0522" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0584", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In verifyBufferObject of Parcel.cpp, there is a possible out-of-bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-179289794", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0584" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0585", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-184963385", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0585" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0586", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-182584940", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0586" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0587", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185259758", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0587" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0588", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9 Android ID: A-177238342", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0588" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0589", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180939982", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0589" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0591", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179386960", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0591" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0593", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179386068", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0593" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0594", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176445224", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0594" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0596", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181346550", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0596" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0597", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496502", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0597" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0598", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180422108", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0598" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0599", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175614289", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0599" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0600", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-179042963", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0600" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0601", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out-of-bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-180643802", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0601" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179910660", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0604" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0640", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-187957589", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0640" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0641", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185235454", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0641" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0642", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-185126149", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0642" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0646", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-153352319", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0646" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-190286685", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0650" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0651", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In loadLabel of PackageItemInfo.java, there is a possible way to cause a denial of service in a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-67013844", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0651" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0652", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing objects that are not thread-safe. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185178568", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0652" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0653", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-177931370", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0653" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0682", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-159624555", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0682" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0683", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In runTraceIpcStop of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-185398942", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0683" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0684", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179839665", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0684" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0687", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-188913943", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0687" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0688", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-161149543", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0688" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0689", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-190188264", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0689" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0690", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-182152757", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0690" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0692", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-179289753", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0692" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0695", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In get_sock_stat of xt_qtaguid.c, there is a possible out-of-bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-184018316References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0695" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0704", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-179338675", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0704" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0706", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Android Versions: Android-10 Android-11Android ID: A-193444889", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0706" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0708", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In runDumpHeap of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-183262161", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0708" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0870", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In RW_SetActivatedTagType of rw_main.cc, memory corruption is possible due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-192472262", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0870" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0919", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-197336441", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0919" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196926917References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0926", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-191053931", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0926" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0928", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-188675581", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0928" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-187527909 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0929" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0930", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-181660091", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0930" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0931", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-180747689", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0931" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0933", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-172251622", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0933" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0952", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-195748381", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0952" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0953", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-184046278", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0953" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0961", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196046570References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0961" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0963", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199754277", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0963" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0964", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-193363621", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0964" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0965", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194300867", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0965" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0967", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In vorbis_book_decodev_set of codebook.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199065614", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0967" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0968", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197868577", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0968" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0970", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-196970023", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0970" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-1972", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1972" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-1976", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1976" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-29647", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29647" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-33909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an out-of-bounds write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-38204", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39621", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126319", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39621" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39623", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In doRead of SimpleDecodingSource.cpp, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194105348", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39623" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39626", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194695497", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39626" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39627", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126549", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39627" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39629", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197353344", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39629" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-150694665 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39633" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-204450605References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39634" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20127", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out-of-bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-221862119", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20127" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20130", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224314979", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20130" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20227", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In USB driver, there is a possible out-of-bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-216825460 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20227" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224536184", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20229" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20355", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-219498290", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20355" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20411", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-232023771", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20411" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239630375 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20421" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-237540956 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20422" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20423", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In rndis_set_response of rndis.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239842288 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20423" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20462", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230356196", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20462" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20466", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "notes": [ { "category": "summary", "text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-179725730", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20466" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20468", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-228450451", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20468" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20469", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230867224", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20469" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20472", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239210579", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20472" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20473", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239267173", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20476", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-240936919", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20476" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20483", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out-of-bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-242459126", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20483" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20498", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246465319", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20498" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20500", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246540168", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20500" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-24-074-07
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "Siemens", "summary": "reporting these vulnerabilities to CISA" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code within the context of a privileged process.", "title": "Risk evaluation" }, { "category": "other", "text": "Critical Manufacturing", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Do not click web links or open attachments in unsolicited email messages.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.", "title": "Recommended Practices" }, { "category": "general", "text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.", "title": "Recommended Practices" }, { "category": "general", "text": "No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.", "title": "Recommended Practices" } ], "publisher": { "category": "coordinator", "contact_details": "central@cisa.dhs.gov", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-24-074-07 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2024/icsa-24-074-07.json" }, { "category": "self", "summary": "ICSA Advisory ICSA-24-074-07 - Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-07" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/topics/industrial-control-systems" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B" } ], "title": "Siemens SIMATIC", "tracking": { "current_release_date": "2024-03-14T06:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-24-074-07", "initial_release_date": "2024-03-14T06:00:00.000000Z", "revision_history": [ { "date": "2024-03-14T06:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "Initial Publication" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003cV2.2", "product": { "name": "Siemens SIMATIC RF160B (6GT2003-0FA00): \u003cV2.2", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "SIMATIC RF160B (6GT2003-0FA00)" } ], "category": "vendor", "name": "Siemens" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-14491", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "An attacker could cause a crash or potentially execute arbitrary code by sending specially crafted DNS responses to the DNSmasq process. In order to exploit this vulnerability, an attacker must be able to trigger DNS requests from the device, and must be in a privileged position to inject malicious DNS responses.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2017-14491" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2017-18509", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "An issue was discovered in net/ipv6/ip6mr.c in the Linux kernel before 4.11. By setting a specific socket option, an attacker can control a pointer in kernel land and cause an inet_csk_listen_stop general protection fault, or potentially execute arbitrary code under certain circumstances. The issue can be triggered as root (e.g., inside a default LXC container or with the CAP_NET_ADMIN capability) or after namespace unsharing. This occurs because sk_type and protocol are not checked in the appropriate part of the ip6_mroute_* functions. NOTE: this affects Linux distributions that use 4.9.x longterm kernels before 4.9.187.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2017-18509" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-0338", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In checkKeyIntent of AccountManagerService.java, there is a possible permission bypass. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-9 Android ID: A-123700107", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0338" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-0417", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In setNiNotification of GpsNetInitiatedHandler.java, there is a possible permissions bypass due to an empty mutable PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-154319182", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-0417" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-10768", "cwe": { "id": "CWE-440", "name": "Expected Behavior Violation" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being \u0027force disabled\u0027 when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10768" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-11301", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Improper authentication of un-encrypted plaintext Wi-Fi frames in an encrypted network can lead to information disclosure in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11301" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-14305", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u0027s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-14381", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A flaw was found in the Linux kernel\u0027s futex implementation. This flaw allows a local attacker to corrupt system memory or escalate their privileges when creating a futex on a filesystem that is about to be unmounted. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-14381" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-15436", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-15436" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-24587", "cwe": { "id": "CWE-326", "name": "Inadequate Encryption Strength" }, "notes": [ { "category": "summary", "text": "The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn\u0027t require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP encryption key is periodically renewed.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-24587" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-25705", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "notes": [ { "category": "summary", "text": "A flaw in ICMP packets in the Linux kernel was found to allow to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well. Kernel versions before 5.10 may be vulnerable to this issue.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-25705" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26555", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "notes": [ { "category": "summary", "text": "Bluetooth legacy BR/EDR PIN code pairing in Bluetooth Core Specification 1.0B through 5.2 may permit an unauthenticated nearby device to spoof the BD_ADDR of the peer device to complete pairing without knowledge of the PIN.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26555" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-26558", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "summary", "text": "Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26558" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-29660", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29660" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2020-29661", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "notes": [ { "category": "summary", "text": "A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29661" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0302", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1 Android-9 Android-10Android ID: A-155287782", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0302" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0305", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In PackageInstaller, there is a possible tapjacking attack due to an insecure default value. This could lead to local escalation of privilege and permissions with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-154015447", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0305" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0325", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_parse_pslice of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-174238784", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0325" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0326", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In p2p_copy_client_info of p2p.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution if the target device is performing a Wi-Fi direct search, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172937525", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0326" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0327", "cwe": { "id": "CWE-269", "name": "Improper Privilege Management" }, "notes": [ { "category": "summary", "text": "In getContentProviderImpl of ActivityManagerService.java, there is a possible permission bypass due to non-restored binder identities. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-172935267", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0327" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0328", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onBatchScanReports and deliverBatchScan of GattService.java, there is a possible way to retrieve Bluetooth scan results without permissions due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-172670415", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0328" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0329", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In several native functions called by AdvertiseManager.java, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege in the Bluetooth server with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-171400004", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0329" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0330", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In add_user_ce and remove_user_ce of storaged.cpp, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in storaged with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-170732441", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0330" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0331", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of NotificationAccessConfirmationActivity.java, there is a possible overlay attack due to an insecure default value. This could lead to local escalation of privilege and notification access with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-170731783", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0331" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0333", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of BluetoothPermissionActivity.java, there is a possible permissions bypass due to a tapjacking overlay that obscures the phonebook permissions dialog when a Bluetooth device is connecting. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-168504491", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0333" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0334", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-163358811", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0334" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0336", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, there is a possible permissions bypass due to a mutable PendingIntent. This could lead to local escalation of privilege that bypasses a permission check, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-158219161", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0336" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0337", "cwe": { "id": "CWE-312", "name": "Cleartext Storage of Sensitive Information" }, "notes": [ { "category": "summary", "text": "In moveInMediaStore of FileSystemProvider.java, there is a possible file exposure due to stale metadata. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-157474195", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0337" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0339", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadAnimation of WindowContainer.java, there is a possible way to keep displaying a malicious app while a target app is brought to the foreground. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-8.1, Android-9 Android ID: A-145728687", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0339" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0341", "cwe": { "id": "CWE-295", "name": "Improper Certificate Validation" }, "notes": [ { "category": "summary", "text": "In verifyHostName of OkHostnameVerifier.java, there is a possible way to accept a certificate for the wrong domain due to improperly used crypto. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171980069", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0341" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0390", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In various methods of WifiNetworkSuggestionsManager.java, there is a possible modification of suggested networks due to a missing permission check. This could lead to local escalation of privilege by a background user on the same device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174749461", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0390" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0391", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate() of ChooseTypeAndAccountActivity.java, there is a possible way to learn the existence of an account, without permissions, due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172841550", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0391" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0392", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In main of main.cpp, there is a possible memory corruption due to a double free. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-175124730", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0392" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0393", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In Scanner::LiteralBuffer::NewCapacity of scanner.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution if an attacker can supply a malicious PAC file, with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-168041375", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0393" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0394", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In android_os_Parcel_readString8 of android_os_Parcel.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-172655291", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0394" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0396", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-160610106", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0396" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0397", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In sdp_copy_raw_data of sdp_discovery.cc, there is a possible system compromise due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174052148", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0397" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0399", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In qtaguid_untag of xt_qtaguid.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-176919394References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0399" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0400", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In injectBestLocation and handleUpdateLocation of GnssLocationProvider.java, there is a possible incorrect reporting of location data to emergency services due to improper input validation. This could lead to incorrect reporting of location data to emergency services with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-177561690", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0400" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0429", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In pollOnce of ALooper.cpp, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175074139", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0429" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0431", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure to a paired device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174149901", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0431" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0433", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceChooserActivity.java, there is a possible way to bypass user consent when pairing a Bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege and pairing malicious devices with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-171221090", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0433" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0434", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onReceive of BluetoothPermissionRequest.java, a phishing attack is possible allowing a malicious Bluetooth device to acquire permissions based on insufficient information presented to the user in the consent dialog. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-167403112", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0434" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0435", "cwe": { "id": "CWE-665", "name": "Improper Initialization" }, "notes": [ { "category": "summary", "text": "In avrc_proc_vendor_command of avrc_api.cc, there is a possible leak of heap data due to uninitialized data. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174150451", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0435" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0436", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In CryptoPlugin::decrypt of CryptoPlugin.cpp, there is a possible out-of-bounds read due to integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496160", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0436" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0437", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In setPlayPolicy of DrmPlugin.cpp, there is a possible double free. This could lead to local escalation of privilege in a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176168330", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0437" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0438", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In several functions of InputDispatcher.cpp, WindowManagerService.java, and related files, there is a possible tapjacking attack due to an incorrect FLAG_OBSCURED value. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10 Android ID: A-152064592", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0438" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0443", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of ScreenshotHelper.java and related files, there is a possible incorrectly saved screenshot due to a race condition. This could lead to local information disclosure across user profiles with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-170474245", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0443" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0444", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In onActivityResult of QuickContactActivity.java, there is an unnecessary return of an intent. This could lead to local information disclosure of contact data with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-178825358", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0444" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0471", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds read due to an integer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444786", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0471" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0473", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "summary", "text": "In rw_t3t_process_error of rw_t3t.cc, there is a possible double free due to uninitialized data. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179687208", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0474", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avrc_msg_cback of avrc_api.cc, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-177611958", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0474" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0476", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In FindOrCreatePeer of btif_av.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-169252501", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0476" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0478", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In updateDrawable of StatusBarIconView.java, there is a possible permission bypass due to an uncaught exception. This could lead to local escalation of privilege by running foreground services without notifying the user, with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-169255797", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0478" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0480", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In createPendingIntent of SnoozeHelper.java, there is a possible broadcast intent containing a sensitive identifier. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-174493336", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0480" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0481", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onActivityResult of EditUserPhotoController.java, there is a possible access of unauthorized files due to an unexpected URI handler. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-172939189", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0481" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0484", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In readVector of IMediaPlayer.cpp, there is a possible read of uninitialized heap data due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-173720767", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0484" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0506", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In ActivityPicker.java, there is a possible bypass of user interaction in intent resolution due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-181962311", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0506" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0507", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In handle_rc_metamsg_cmd of btif_rc.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181860042", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0507" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0508", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176444154", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0508" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0509", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444161", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0509" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0510", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In decrypt_1_2 of CryptoPlugin.cpp, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-176444622", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0510" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0511", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In Dex2oat of dex2oat.cc, there is a possible way to inject bytecode into an app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11 Android ID: A-178055795", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0511" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0512", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In __hidinput_change_resolution_multipliers of hid-input.c, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-173843328References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0512" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0513", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In deleteNotificationChannel and related functions of NotificationManagerService.java, there is a possible permission bypass due to improper state validation. This could lead to local escalation of privilege via hidden services with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-156090809", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0513" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0514", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In several functions of the V8 library, there is a possible use after free due to a race condition. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-9, Android-11, Android-8.1 Android ID: A-162604069", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0514" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0515", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In Factory::CreateStrictFunctionMap of factory.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-167389063", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0515" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0516", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In p2p_process_prov_disc_req of p2p_pd.c, there is a possible out-of-bounds read and write due to a use after free. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181660448", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0516" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0519", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BITSTREAM_FLUSH of ih264e_bitstream.h, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-176533109", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0519" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0520", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In several functions of MemoryFileSystem.cpp and related files, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-10 Android ID: A-176237595", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0520" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0521", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAllPackages of PackageManagerService, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure of cross-user permissions with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-174661955", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0521" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0522", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ConnectionHandler::SdpCb of connection_handler.cc, there is a possible out-of-bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-174182139", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0522" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0584", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In verifyBufferObject of Parcel.cpp, there is a possible out-of-bounds read due to an improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-179289794", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0584" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0585", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In beginWrite and beginRead of MessageQueueBase.h, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-184963385", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0585" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0586", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of DevicePickerFragment.java, there is a possible way to trick the user to select an unwanted bluetooth device due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-182584940", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0586" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0587", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In StreamOut::prepareForWriting of StreamOut.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185259758", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0587" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0588", "cwe": { "id": "CWE-668", "name": "Exposure of Resource to Wrong Sphere" }, "notes": [ { "category": "summary", "text": "In processInboundMessage of MceStateMachine.java, there is a possible SMS disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9 Android ID: A-177238342", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0588" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0589", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In BTM_TryAllocateSCN of btm_scn.cc, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180939982", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0589" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0591", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendReplyIntentToReceiver of BluetoothPermissionActivity.java, there is a possible way to invoke privileged broadcast receivers due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179386960", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0591" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0593", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In sendDevicePickedIntent of DevicePickerFragment.java, there is a possible way to invoke a privileged broadcast receiver due to a confused deputy. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179386068", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0593" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0594", "cwe": { "id": "CWE-74", "name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity, there is a possible remote bypass of user consent due to improper input validation. This could lead to remote (proximal, NFC) escalation of privilege allowing an attacker to deceive a user into allowing a Bluetooth connection with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-176445224", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0594" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0596", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In phNciNfc_RecvMfResp of phNxpExtns_MifareStd.cpp, there is a possible out-of-bounds read due to a missing bounds check. This could lead to remote information disclosure over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-181346550", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0596" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0597", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In notifyProfileAdded and notifyProfileRemoved of SipService.java, there is a possible way to retrieve SIP account names due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-176496502", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0597" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0598", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of ConfirmConnectActivity.java, there is a possible pairing of untrusted Bluetooth devices due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-180422108", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0598" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0599", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In scheduleTimeoutLocked of NotificationRecord.java, there is a possible disclosure of a sensitive identifier via broadcasted intent due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-175614289", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0599" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0600", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-179042963", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0600" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0601", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In encodeFrames of avc_enc_fuzzer.cpp, there is a possible out-of-bounds write due to a double free. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-180643802", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0601" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0604", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In generateFileInfo of BluetoothOppSendFileInfo.java, there is a possible way to share private files over Bluetooth due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-179910660", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0604" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0640", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In noteAtomLogged of StatsdStats.cpp, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-187957589", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0640" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0641", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In getAvailableSubscriptionInfoList of SubscriptionController.java, there is a possible disclosure of unique identifiers due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185235454", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0641" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0642", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onResume of VoicemailSettingsFragment.java, there is a possible way to retrieve a trackable identifier without permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-185126149", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0642" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0646", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In sqlite3_str_vappendf of sqlite3.c, there is a possible out-of-bounds write due to improper input validation. This could lead to local escalation of privilege if the user can also inject a printf into a privileged process\u0027s SQL with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-153352319", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0646" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0650", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In WT_InterpolateNoLoop of eas_wtengine.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-190286685", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0650" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0651", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In loadLabel of PackageItemInfo.java, there is a possible way to cause a denial of service in a device by having a long label in an app due to incorrect input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-67013844", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0651" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0652", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In VectorDrawable::VectorDrawable of VectorDrawable.java, there is a possible way to introduce a memory corruption due to sharing objects that are not thread-safe. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-8.1, Android-9, Android-10, Android-11 Android ID: A-185178568", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0652" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0653", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In enqueueNotification of NetworkPolicyManagerService.java, there is a possible way to retrieve a trackable identifier due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-177931370", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0653" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0682", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In sendAccessibilityEvent of NotificationManagerService.java, there is a possible disclosure of notification data due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-159624555", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0682" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0683", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In runTraceIpcStop of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-8.1, Android-9, Android-10 Android ID: A-185398942", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0683" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0684", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In TouchInputMapper::sync of TouchInputMapper.cpp, there is a possible out-of-bounds write due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-179839665", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0684" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0687", "cwe": { "id": "CWE-834", "name": "Excessive Iteration" }, "notes": [ { "category": "summary", "text": "In ellipsize of Layout.java, there is a possible ANR due to improper input validation. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-188913943", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0687" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0688", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In lockNow of PhoneWindowManager.java, there is a possible lock screen bypass due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-161149543", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0688" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0689", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In RGB_to_BGR1_portable of SkSwizzler_opts.h, there is a possible out-of-bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-8.1, Android-9 Android ID: A-190188264", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0689" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0690", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In ih264d_mark_err_slice_skip of ih264d_parse_pslice.c, there is a possible out-of-bounds write due to heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-182152757", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0690" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0692", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendBroadcastToInstaller of FirstScreenBroadcast.java, there is a possible activity launch due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-11, Android-9, Android-10 Android ID: A-179289753", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0692" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0695", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In get_sock_stat of xt_qtaguid.c, there is a possible out-of-bounds read due to a use after free. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-184018316References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0695" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0704", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In createNoCredentialsPermissionNotification and related functions of AccountManagerService.java, there is a possible way to retrieve accounts from the device without permissions due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-179338675", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0704" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0706", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In startListening of PluginManagerImpl.java, there is a possible way to disable arbitrary app components due to a missing permission check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Android Versions: Android-10 Android-11Android ID: A-193444889", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0706" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0708", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In runDumpHeap of ActivityManagerShellCommand.java, deletion of system files is possible due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-183262161", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0708" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0870", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In RW_SetActivatedTagType of rw_main.cc, memory corruption is possible due to a race condition. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-9, Android-10, Android-11, Android-8.1 Android ID: A-192472262", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0870" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0919", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In getService of IServiceManager.cpp, there is a possible unhandled exception due to an integer overflow. This could lead to local denial of service making the lockscreen unusable with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-197336441", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0919" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0920", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In unix_scm_to_skb of af_unix.c, there is a possible use after free bug due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196926917References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0920" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0926", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In onCreate of NfcImportVCardActivity.java, there is a possible way to add a contact without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-191053931", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0926" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0928", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In createFromParcel of OutputConfiguration.java, there is a possible parcel serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-9 Android ID: A-188675581", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0928" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0929", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In ion_dma_buf_end_cpu_access and related functions of ion.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-187527909 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0929" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0930", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_process_ext_rsp of phNxpNciHal_ext.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over NFC with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-181660091", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0930" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0931", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In getAlias of BluetoothDevice.java, there is a possible way to create misleading permission dialogs due to missing data filtering. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-180747689", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0931" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0933", "cwe": { "id": "CWE-116", "name": "Improper Encoding or Escaping of Output" }, "notes": [ { "category": "summary", "text": "In onCreate of CompanionDeviceActivity.java or DeviceChooserActivity.java, there is a possible way for HTML tags to interfere with a consent dialog due to improper input validation. This could lead to remote escalation of privilege, confusing the user into accepting pairing of a malicious Bluetooth device, with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-172251622", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0933" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0952", "cwe": { "id": "CWE-311", "name": "Missing Encryption of Sensitive Data" }, "notes": [ { "category": "summary", "text": "In doCropPhoto of PhotoSelectionHandler.java, there is a possible permission bypass due to a confused deputy. This could lead to local information disclosure of user\u0027s contacts with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-195748381", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0952" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0953", "cwe": { "id": "CWE-281", "name": "Improper Preservation of Permissions" }, "notes": [ { "category": "summary", "text": "In setOnClickActivityIntent of SearchWidgetProvider.java, there is a possible way to access contacts and history bookmarks without permission due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-184046278", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0953" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0961", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "In quota_proc_write of xt_quota2.c, there is a possible way to read kernel memory due to uninitialized data. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-196046570References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0961" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0963", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "notes": [ { "category": "summary", "text": "In onCreate of KeyChainActivity.java, there is a possible way to use an app certificate stored in keychain due to a tapjacking/overlay attack. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199754277", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0963" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0964", "cwe": { "id": "CWE-681", "name": "Incorrect Conversion between Numeric Types" }, "notes": [ { "category": "summary", "text": "In C2SoftMP3::process() of C2SoftMp3Dec.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-193363621", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0964" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0965", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "summary", "text": "In AndroidManifest.xml of Settings, there is a possible pairing of a Bluetooth device without user\u0027s consent due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194300867", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0965" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0967", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In vorbis_book_decodev_set of codebook.c, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-199065614", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0967" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0968", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In osi_malloc and osi_calloc of allocator.cc, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197868577", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0968" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-0970", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "notes": [ { "category": "summary", "text": "In createFromParcel of GpsNavigationMessage.java, there is a possible Parcel serialization/deserialization mismatch. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-196970023", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-0970" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-1972", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "notes": [ { "category": "summary", "text": "Possible buffer overflow due to improper validation of device types during P2P search in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1972" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-1976", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "A use after free can occur due to improper validation of P2P device address in PD Request frame in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1976" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-29647", "cwe": { "id": "CWE-909", "name": "Missing Initialization of Resource" }, "notes": [ { "category": "summary", "text": "An issue was discovered in the Linux kernel before 5.11.11. qrtr_recvmsg in net/qrtr/qrtr.c allows attackers to obtain sensitive information from kernel memory because of a partially uninitialized data structure, aka CID-50535249f624.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-29647" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-33909", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not properly restrict seq buffer allocations, leading to an integer overflow, an out-of-bounds write, and escalation to root by an unprivileged user, aka CID-8cae8cd89f05.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-33909" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-38204", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38204" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39621", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126319", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39621" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39623", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In doRead of SimpleDecodingSource.cpp, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194105348", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39623" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39626", "cwe": { "id": "CWE-610", "name": "Externally Controlled Reference to a Resource in Another Sphere" }, "notes": [ { "category": "summary", "text": "In onAttach of ConnectedDeviceDashboardFragment.java, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege in Bluetooth settings with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-194695497", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39626" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39627", "cwe": { "id": "CWE-732", "name": "Incorrect Permission Assignment for Critical Resource" }, "notes": [ { "category": "summary", "text": "In sendLegacyVoicemailNotification of LegacyModeSmsHandler.java, there is a possible permissions bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-185126549", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39627" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39629", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In phTmlNfc_Init and phTmlNfc_CleanUp of phTmlNfc.cc, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-9 Android ID: A-197353344", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39629" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "notes": [ { "category": "summary", "text": "In gre_handle_offloads of ip_gre.c, there is a possible page fault due to an invalid memory access. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-150694665 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39633" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2021-39634", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In fs/eventpoll.c, there is a possible use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-204450605References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39634" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20127", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "summary", "text": "In ce_t4t_data_cback of ce_t4t.cc, there is a possible out-of-bounds write due to a double free. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-221862119", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20127" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20130", "cwe": { "id": "CWE-754", "name": "Improper Check for Unusual or Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out-of-bounds write due to a heap buffer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224314979", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20130" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20227", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In USB driver, there is a possible out-of-bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-216825460 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20227" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20229", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-224536184", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20229" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20355", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "summary", "text": "In get of PacProxyService.java, there is a possible system service crash due to improper input validation. This could lead to local denial of service with User execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-219498290", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20355" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20411", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avdt_msg_asmbl of avdt_msg.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-232023771", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20411" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20421", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "summary", "text": "In binder_inc_ref_for_node of binder.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239630375 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20421" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20422", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "summary", "text": "In emulation_proc_handler of armv8_deprecated.c, there is a possible way to corrupt memory due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-237540956 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20422" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20423", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "summary", "text": "In rndis_set_response of rndis.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to local escalation of privilege if a malicious USB device is attached with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-239842288 References: Upstream kernel", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20423" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20462", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In phNxpNciHal_write_unlocked of phNxpNciHal.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230356196", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20462" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20466", "cwe": { "id": "CWE-1188", "name": "Initialization of a Resource with an Insecure Default" }, "notes": [ { "category": "summary", "text": "In applyKeyguardFlags of NotificationShadeWindowControllerImpl.java, there is a possible way to observe the user\u0027s password on a secondary display due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-179725730", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20466" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20468", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In BNEP_ConnectResp of bnep_api.cc, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-228450451", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20468" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20469", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "summary", "text": "In avct_lcb_msg_asmbl of avct_lcb_act.cc, there is a possible out-of-bounds write due to a missing bounds check. This could lead to local escalation of privilege over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-230867224", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20469" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20472", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239210579", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20472" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20473", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In toLanguageTag of LocaleListCache.cpp, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-239267173", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20473" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20476", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "notes": [ { "category": "summary", "text": "In setEnabledSetting of PackageManager.java, there is a possible way to get the device into an infinite reboot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L Android ID: A-240936919", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20476" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20483", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "summary", "text": "In several functions that parse avrc response in avrc_pars_ct.cc and related files, there are possible out-of-bounds reads due to integer overflows. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-242459126", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20483" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20498", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "summary", "text": "In fdt_path_offset_namelen of fdt_ro.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246465319", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20498" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2022-20500", "cwe": { "id": "CWE-755", "name": "Improper Handling of Exceptional Conditions" }, "notes": [ { "category": "summary", "text": "In loadFromXml of ShortcutPackage.java, there is a possible crash on boot due to an uncaught exception. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-10, Android-11, Android-12, Android-12L, Android-13 Android ID: A-246540168", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "www.cve.org", "url": "https://www.cve.org/CVERecord?id=CVE-2022-20500" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "remediations": [ { "category": "mitigation", "details": "Siemens has released a new version (V2.2) for SIMATIC RF160B and recommends to update to the latest version.", "product_ids": [ "CSAFPID-0001" ] }, { "category": "mitigation", "details": "As a general security measure, Siemens recommends protecting network access to devices with appropriate mechanisms. To operate the devices in a protected IT environment, Siemens recommends configuring the environment according to Siemens\u0027 operational guidelines for industrial security and following recommendations in the product manuals.", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/cert/operational-guidelines-industrial-security" }, { "category": "mitigation", "details": "Additional information on industrial security by Siemens can be found on the Siemens industrial security webpage", "product_ids": [ "CSAFPID-0001" ], "url": "https://www.siemens.com/industrialsecurity" }, { "category": "mitigation", "details": "For more information see the associated Siemens security advisory SSA-770721 in HTML and CSAF.", "product_ids": [ "CSAFPID-0001" ], "url": "https://cert-portal.siemens.com/productcert/html/ssa-770721.html" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ghsa-6v44-4w2g-hxp9
Vulnerability from github
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
{ "affected": [], "aliases": [ "CVE-2020-29660" ], "database_specific": { "cwe_ids": [ "CWE-416", "CWE-667" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-12-09T17:15:00Z", "severity": "HIGH" }, "details": "A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.", "id": "GHSA-6v44-4w2g-hxp9", "modified": "2022-05-24T17:35:46Z", "published": "2022-05-24T17:35:46Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29660" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00018.html" }, { "type": "WEB", "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOB25SU6XUL4TNP7KB63WNZSYTIYFDPP" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZ7OAKAEFAXQRGBZK4LYUWINCD3D2XCL" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20210122-0001" }, { "type": "WEB", "url": "https://www.debian.org/security/2021/dsa-4843" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2020/12/10/1" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.